content
stringlengths 27
653k
| pred_label
stringclasses 2
values | pred_score_pos
float64 0.5
1
|
|---|---|---|
Drosophila Tufted Is a Gain-of-Function Allele of the Proneural Gene amos
Eric C. Lai
Tufted is a classical Drosophila mutant characterized by a large number of ectopic mechanosensory bristles on the dorsal mesothorax. Unlike other ectopic bristle mutants, Tufted is epistatic to achaete and scute, the proneural genes that normally control the development of these sensory organs. In this report, I present genetic and molecular evidence that Tufted is a gain-of-function allele of the proneural gene amos that ectopically activates mechanosensory neurogenesis. I also systematically examine the ability of the various proneural bHLH proteins to cross-activate each other and find that their ability to do so is in general relatively limited, despite their common ability to induce the formation of mechanosensory bristles. This phenomenon seems instead to be related to their shared ability to activate Asense and Senseless.
ALTHOUGH the nervous system of the fruitfly is quite complex, it is also highly stereotyped. These characteristics make it an ideal experimental system for understanding basic principles of pattern formation. Accordingly, studies of how the Drosophila nervous system is assembled have occupied the collective efforts of hundreds of developmental geneticists over the decades.
The pattern of sensory organs in both the embryo and the adult is prefigured by the spatially patterned expression and activity of the proneural genes, which encode basic helix-loop-helix (bHLH) transcriptional activators (reviewed by Bertrandet al. 2002). Proneural activity confers neural potential upon groups of adjacent cells referred to as proneural clusters (PNCs). Interactions among PNC cells restrict this potential to sensory organ precursor (SOP) cells; non-SOP cells of a PNC usually adopt a nonneuronal fate. This process is commonly referred to as “lateral inhibition” and is mediated by cell-cell signaling via the Notch receptor and the products of the neurogenic genes (reviewed by Artavanis-Tsakonaset al. 1999). Once stably specified, the SOP typically undergoes a fixed series of cell divisions to generate the different cells that make up a mature sensory organ, although nonclonally related cells are recruited into certain types of sensory organs. In the case of the mechanosensory bristles, divisions of the SOP generate five cells: a socket cell and shaft cell (which produce structures that are visible from the exterior) and a glial cell, sheath cell, and neuron (which lie beneath the cuticle; Ghoet al. 1999; Reddy and Rodrigues 1999). The glial cell subsequently undergoes programmed cell death, leaving four cells in the mature mechanosensory organ (Fichelson and Gho 2003).
There are two subclasses of proneural bHLH proteins. The Ato class includes Atonal (Ato) and Absent solomultiple-dendritic (MD) neurons and olfactory sensilla (Amos); Ato controls the development of chordotonal organs, R8 photoreceptors, and a subset of olfactory sensilla (Jarman et al. 1993, 1994; Gupta and Rodrigues 1997) while Amos regulates the development of certain MD and olfactory neurons (Gouldinget al. 2000; Huanget al. 2000). Members of the ASC class are encoded by genes in the ac-sc complex (AS-C; Alonso and Cabrera 1988) and include Achaete (Ac), Scute (Sc), and Lethal of scute (L’sc). Ac and Sc are the proneural proteins for the adult mechanosensory bristles (García-Bellido 1979), while L’sc controls the development of the embryonic central nervous system and musculature (Martin-Bermudoet al. 1991; Carmenaet al. 1995). A fourth member of the AS-C, asense (ase), also encodes a protein with an ASC-class bHLH domain. It is not, however, a true proneural protein as it is expressed only by SOPs and not in PNCs; it is likely involved in sensory organ differentiation (Brandet al. 1993; Dominguez and Campuzano 1993). Another transcription factor expressed in SOPs is the zinc finger protein Senseless (Sens); it is involved in maintenance of proneural gene expression (Noloet al. 2000). Although expression of Ase and Sens is normally restricted to SOPs, both exhibit “proneural” activity in that they induce the formation of ectopic sensory organs when misexpressed.
The mechanosensory bristles that cover the exterior of the fly can be observed in live individuals at low magnification; thus, mutations that affect their distribution are easily identified. Two general classes of mutants display extra bristles. Those that compromise lateral inhibition cause multiple SOPs to emerge from an individual PNC, leading to an increase in bristle density or the presence of tight bristle tufts lacking intervening epidermal cells (i.e., Bearded; Leviten and Posakony 1996). In this situation, extra sensory organs arise from the normal complement of proneural clusters. A second class of mutant displays sensory organs in wholly ectopic positions, although these are always separated by epidermal cells. This results from the generation of ectopic proneural clusters, from which singularized SOPs are chosen. Most of the phenotypically strong mutations in the latter class correspond to lesions in hairy (h) or extramacrochaetae (emc; Bridges and Morgan 1923; Moscoso del Prado and García-Bellido 1984). Both encode negative regulators of the proneural proteins: HAIRY is a bHLH protein that directly represses transcription of ac, while EMC is an HLH-only protein that binds to and inhibits the DNA-binding activity of proneural proteins (Van Doren et al. 1992, 1994; Ohsakoet al. 1994). A rarer set of mutants with ectopic PNCs has been designated Hairy-wing (Hw). Once thought to represent a distinct locus in the AS-C, Hw mutants are actually gain-of-function alleles of ac and sc that ectopically activate neurogenesis (Campuzanoet al. 1986; Balcellset al. 1988).
Another mutant with a dramatic ectopic bristle phenotype is Tufted (Tft; Ritterhoff 1952). Surprisingly, it has been little studied since its discovery 50 years ago. In this report, I characterize the cellular basis of the Tft phenotype and show that it results from the establishment of ectopic proneural domains and selection of extra SOPs. Unexpectedly, Tft neither is dependent upon nor significantly cross-activates expression of Ac and Sc, indicating that it harbors proneural activity for mechanosensory organs. Consistent with this, I present genetic and molecular evidence that Tft is a gain-of-function allele of the proneural gene amos that ectopically activates mechanosensory neurogenesis. Misexpression of any of the proneural proteins can promote the development of mechanosensory organs, and I provide evidence that this is not generally due to promiscuous activation of Ac and Sc, but rather to induction of Ase and Sens.
Drosophila stocks: All mutant alleles and transgenic stocks utilized in this study have been previously described: Tft1/SM-TM6B (Ritterhoff 1952), In(1)sc10-1/FM7 (García-Bellido and Santamaria 1978), isoRoi/CyO (Chanutet al. 2002), ato1/TM6B (Jarmanet al. 1994), UAS-ato (Jarmanet al. 1993), daKX136/SM-TM6B (Caudyet al. 1988), sensE2/TM6B and UAS-sens (Noloet al. 2000), ac 2.2-kb genomic transgene (Van Dorenet al. 1994), dpp40C6-Gal4/TM6C (Staehling-Hamptonet al. 1994), bxMS1096-Gal4 (Capdevila and Guerrero 1994), UAS-amos (Gouldinget al. 2000), UAS-sc (Chienet al. 1996), neurA101-lacZ/TM6B (Bellenet al. 1989), m4-lacZ (Bailey and Posakony 1995), hs-Gal4 (Brand and Perrimon 1993), Brd1/ TM6B (Leviten and Posakony 1996), and f, hs-flp; 101E-Gal4 (de Celis and Bray 1997).
Cytology: Tft1/+ polytene chromosomes displayed a cytologically visible aberration at 36F-37A. The nature of the aberration was analyzed using a tiling set of 5-kb digoxigenin-labeled probes representing 100 kb of DNA from the 36F3-7 region. A contiguous set of probes hybridized to an additional band in the 37A region of the Tft1 chromosome, suggesting that the Tft1 aberration involves a duplication and translocation of material from 36F3-7 to 37A. The proximal limit was not determined, but extends a minimum of 75 kb upstream of amos. Two nonoverlapping probes 0-5 and 5-10 kb downstream of the amos start site both showed variable, but modest, amounts of duplicated signal. This suggests that the structure of this end of the aberration is complex, but terminates in the vicinity of amos.
Immunofluorescence: Imaginal discs were processed for immunofluorescence as described previously (Lai and Rubin 2001). The following dilutions for antibodies were used in this study: rabbit α-Scute (1:200, gift of Hugo Bellen), mouse α-Achaete [1:100, Developmental Hybridoma Studies Bank (DHSB)], rabbit α-Asense (1:2500, gift of Yuh Nung Han), rabbit α-Amos (1:4000, gift of Andrew Jarman), rabbit α-Atonal (1:2000, gift of Andrew Jarman), guinea pig α-Senseless (1:5000, gift of Hugo Bellen), mouse α-Delta (1:100, DHSB), mouse α-E(spl)b323 (1:5, gift of Sarah Bray), mouse α-Hindsight (1:50, DHSB), mouse α-Cut (1:100, DHSB), mouse α-β-galactosidase (1:100, DHSB), rabbit α-β-galactosidase (1:5000, Cappel), and rabbit α-Neur (1:400; Laiet al. 2001).
Phenotypic and cellular characterization of Tft: The Tft locus is defined by a single, viable mutant (Tft1) that displays a large number of ectopic mechanosensory bristles, particularly in the postalar, dorsocentral, and scutellar regions of the notum (Figure 1, A and B) (Arnheim 1967; Ritterhoff 1952). I analyzed the expression of several markers of the SOP fate in this mutant, including Hindsight (Hnt; Pickupet al. 2002), Senseless (Sens), neurA101-lacZ (A101), and Asense (Ase). I observed extra cells positive for each marker in the presumptive posterior notal region of Tft/+ wing imaginal discs (Figure 2, A-H, arrows), demonstrating that the Tft phenotype is due to ectopic adoption of the SOP fate. Ectopic SOPs appear to subsequently develop into normal sensory organs in Tft, since ectopic mechanosensory organs contain both sockets and shafts and have neurons that are functionally connected to the central nervous system (Ghysen and Richelle 1979).
Ectopic bristle phenotypes can generally be classified according to whether they arise from ectopic proneural clusters or reflect a failure of lateral inhibition. The term bristle “tufting” is popularly used to refer specifically to a failure of lateral inhibition. Indeed, the presence of closely spaced or even adjacent bristles in Tft flies (Figure 1B) and the determination of SOPs adjacent to each other in Tft wing imaginal discs (Figure 2, E-H) together suggest a defect in lateral inhibition. However, the number of ectopic bristles in the Tft-affected region was significantly increased in Tft1/+; Brd1/+ double heterozygotes (Figure 1E), indicating that Tft bristles are still sensitive to lateral inhibition. In addition, many Tft bristles were seen at clearly ectopic locations, including the anterior-central portion of the scutellum (Figure 1, A and B) and the metathoracic notum (not shown). This suggested the existence of ectopic proneural domains, which are not characteristic of neurogenic mutants.
Figure 1.
—The Tft1 adult phenotype. Shown are scanning electron micrographs (SEMs) of thoraces from adult males of the following genotypes: (A) Canton-S, showing the wild-type pattern of mechanosensory bristles. Inset shows an anterior-central portion of the scutellum that normally lacks sensory organs. (B) Tft1/+, displaying many ectopic macrochaetae and microchaetae; inset shows microchaetae present on the scutellum. (C) sc10-1/Y fly is essentially devoid of mechanosensory organs. (D) sc10-1/Y; Tft1/+ shows ectopic sensory organs in the Tft-affected region. (E) Tft1/+; Brd1/+ shows enhancement of the Tft phenotype; Brd1 heterozygotes display only a few extra macrochaetae in the Tft-sensitive region (Leviten and Posakony 1996). (F) Tft1/dakx136 shows suppression of the Tft phenotype.
I assessed the distribution of proneural clusters using a number of additional markers and observed both elevated and ectopic activity of E(spl)m4-lacZ (as marked by β-galactosidase; Figure 3, A and E, arrows) and expression of E(spl)bHLH proteins (as marked by the MAb323 antibody; Figure 3, B and F, arrows), indicating the presence of ectopic proneural clusters. Notably, these results also indicate that the Tft phenotype is not due to a failure to activate components of lateral inhibition. Surprisingly, I did not observe comparable ectopic expression of Sc and Ac (Figure 3, C, D, G, and H, arrows), the proneural proteins for the adult peripheral nervous system (PNS). Doubly stained preparations showed that ectopic SOPs (as marked by Sens) in the Tft background were not generally associated with corresponding proneural clusters of Ac expression, although Ac could sometimes be observed in ectopic SOPs (Figure 3, I and J). This contrasts with what has been shown for other ectopic bristle mutants such as hairy and extramacrochaetae, which are associated with ectopic clusters of proneural expression and/or activity (Skeath and Carroll 1991; Van Doren et al. 1992, 1994). In summary, Tft is an unusual extra-bristle mutant: It exhibits both ectopic proneural domains and some defect in lateral inhibition, and ectopic neurogenesis is not generally accompanied by corresponding Ac/Sc expression.
Tufted harbors proneural activity for mechanosensory organs: Simultaneous inactivation of ac and sc, the proneural genes for the adult PNS, results in a nearly completely bald fly lacking most mechanosensory organs (sc10-1/Y, Figure 1C). The bald phenotype of sc10-1/Y is epistatic to that of most other ectopic bristle mutants, indicating the fundamental role for these genes in establishing adult peripheral neurogenesis. In contrast, the ectopic bristle phenotype of Tft was epistatic to sc10-1/Y (Figure 1D); similar findings have been noted previously (A. Garcia-Bellido, personal communication cited in Ghysen and Richelle 1979). The ability of Tft to bypass the requirement for Ac/Sc demonstrates that Tft harbors an independent proneural activity. In accord with this, ectopic expression of Sens and Hnt was specifically maintained in the Tft-affected region of sc10-1/Y; Tft/+ wing discs (Figure 2, I-L, arrows). Since neurogenic genes do not exhibit proneural activity, the name “Tufted” is somewhat of a misnomer.
Figure 2.
Tft causes ectopic adoption of the SOP fate in an ac/sc-independent manner. Shown are wing imaginal discs from Canton-S (A-D), Tft1/+ (E-H), sc10-1/Y (I and J), and sc10-1/Y; Tft1/+ (K and L). Ectopic cells express a broad range of markers of the SOP fate in the presumptive posterior notum and scutellum of Tft wing discs (arrows), including Hindsight (Hnt, A and E), Senseless (Sens, B and F), neurA101-lacZ stained for β-galactosidase (A101, C and G), and Asense (Ase, D and H). Ectopic SOPs develop independently of the normal proneural genes for the PNS. sc10-1/Y individuals lack most SOPs (compare brackets in B and J), with the exception of ato-dependent positions (e.g., I, asterisk); nonsensory aspects of Hnt expression [I, tracheal tubes (T)] or Sens expression [J, wing margin (WM)] are unaffected. In this background, Tft still generates ectopic SOPs (I-L, arrows), even though most other SOPs are still absent (L, bracket).
I tested Tft for genetic interactions with other loci high in the regulatory hierarchy for peripheral neurogenesis. Genetic interactions were not observed with either ato or sens, nor was Tft enhanced by increasing ac dosage using an ac genomic transgene (data not shown). However, Tft was partially suppressed by removal of one copy of daughterless (da; Figure 1F), which encodes a bHLH heterodimeric partner for proneural bHLH proteins. In addition, Tft was previously reported to be suppressed by Df(1)260-1, a deficiency of the entire AS-C (A. Garcia-Bellido, personal communication cited in Campuzanoet al. 1985). These interactions suggest that the Tft phenotype might be due to altered bHLH activity.
Tft is associated with an aberration at 36F-37A that results in misexpression of amos: Tft was previously mapped to ∼37A (FlyBase 1998) and shown to be reverted by deficiencies of this cytological region (Wrightet al. 1976), a genetic property consistent with it being a gain-of-function allele. Examination of polytene chromosomes revealed a complex aberration involving a duplication and translocation of sequences at 36F3-7 to 37A (Figure 4, A-D, asterisks; see also materials and methods and the Figure 4 legend for details of this analysis). I noted that the proneural bHLH-encoding gene amos is located at one end of the aberration (Figure 4A); amos is involved in the development of embryonic multiple-dendritic neurons and adult olfactory sensilla (Gouldinget al. 2000; Huanget al. 2000). Since directed misexpression of Amos results in the ectopic production of several types of sensilla, including mechanosensory organs, it was conceivable that Tft is due to misexpression of Amos.
I tested this hypothesis by staining wild-type and Tft tissue for Amos, which is not normally expressed in the wing disc (Figure 4E). Ectopic Amos was indeed observed in the presumptive posterior notal region of the Tft wing disc (Figure 4F) as well as at the base of the haltere disc (data not shown). Consistent with the genetics of Tft, the domain of ectopic Amos was independent of ac/sc (Figure 4G) and included the precise region from which ectopic SOPs are determined in this mutant (Figure 4, H-J).
The findings that Tft specifically misexpresses Amos and interacts genetically with da, which encodes a known heterodimeric partner of Amos (Gouldinget al. 2000; Huanget al. 2000), suggested that Amos is a primary contributor to the Tft phenotype. However, the Tft duplication extends a minumum of 75 kb upstream of amos and affects several additional genes (Figure 4A). In addition, previous reports have differed on the efficacy with which ectopic Amos induces the formation of mechanosensory organs (Gouldinget al. 2000; Huanget al. 2000). I therefore performed additional misexpression experiments to further substantiate the hypothesis that Tft is an allele of amos.
Conditional misexpression of amos efficiently initiates peripheral neurogenesis and induces mechanosensory organ formation: Although prolonged misexpression of amos using drivers such as dpp-Gal4 and bxMS1096-Gal4 resulted in pupal lethality, I was able to characterize their disc phenotypes in detail using the PNC and SOP markers described earlier. Misexpression of Amos with either driver resulted in massive ectopic expression of proneural cluster markers such as Delta (Dl), E(spl)m4-lacZ, and E(spl)bHLHs (Figure 5, A-E, and data not shown); of SOP markers such as Hnt, Sens, Ase, and Neur (Figure 5, F-I, and data not shown); and also led to a significant increase in disc size. Induction of Cut by Amos (Figure 5J, arrow) served as an additional measure of the identity of many ectopic SOPs as precursors for external sensory organs (compare with wild type, inset to J) and contrasted with the activity of the related bHLH Ato, which instead represses Cut (Jarman and Ahmed 1998). Thus, ectopic Amos efficiently establishes new proneural domains and strongly induces external peripheral neurogenesis. Notably, the levels of ectopically produced proteins were generally far greater than those of the corresponding endogenous proteins, suggesting that the neuronal program was “super-activated” by Amos. In spite of this, Sc was only mildly misexpressed in response to Amos (Figure 7G), and ectopic Ac was observed essentially only in the presumptive notum posterior (Figure 7J). In fact, some aspects of Ac expression were somewhat suppressed by Amos. Taken together with the observations that the Tft phenotype does not involve Ac or Sc, I conclude that the neuronal program initiated by ectopic Amos is largely independent of the normal proneural genes for mechanosensory neurogenesis.
Figure 3.
—Upregulation and misexpression of downstream proneural cluster markers in Tft discs. Shown are wing imaginal discs from wild type (A-D) and Tft1/+ (E-J) stained for β-galactosidase (A and E), E(spl)bHLHs stained with Mab323 (B and F), Scute (Sc; C and G), Achaete (Ac; D and H), and Sens + Ac (I and J). Ectopic and increased levels of E(spl)m4 promoter activity (A and E, arrows) and E(spl)bHLH proteins (B and F, arrows) are observed in Tft tissue, whereas Sc (C and G) and Ac (D and H) expression is only mildly affected. Some ectopic cells that adopt a high level of Ac expression are seen in well-stained preparations. (I and J) Higher magnification view of the presumptive posterior notum of a Tft1/+ disc; double staining demonstrates that ectopic SOPs (as marked by Sens; I) are not associated with ectopic clusters of Ac expression, although ectopic Ac is seen in some SOPs (J).
Unexpectedly, commitment to the SOP fate was not generally coincident with expression of Amos on a cell-by-cell basis, in spite of the ease with which Amos induced SOP-specific gene expression. I observed that both Hnt (Figure 5, K-M) and neurA101-lacZ (Figure 5, N-P) were expressed at low levels or not at all by Amos-expressing cells, while cells that accumulated high levels of these markers instead had low levels of or lacked Amos. The same observation applied to Tft tissue as well: Hnt-positive cells in the region displaying ectopic neurogenesis often did not express Amos (Figure 4, H-J). I attempted to assess the autonomy of clones of Amos-misexpressing cells using a FLP-out Gal4 strategy, but this typically resulted in bald patches in the adult, possibly due to toxicity of high and prolonged expression of Amos. However, in the small number of cases where ectopic bristles were formed, they were always Amos+, indicating that induction of sense organs by Amos is likely autonomous (Figure 6C). Consistent with this, Tft1 was likewise previously determined to be cell autonomous in tissue mosaics (Arnheim 1967). Therefore, the inverse relationship between expression of Amos and SOP markers appears to represent negative regulation of Amos in SOPs.
dppGal4>UAS-amos pharate adults were occasionally recovered when they were reared at 18°; these individuals displayed a large number of ectopic mechanosensory organs (Figure 6, A and B). In fact, the ability of UAS-amos to generate ectopic mechanosensory organs with this driver was greater than that of other proneural genes, including UAS-ac, UAS-sc, and UAS-ato; only UAS-sens was on a par with UAS-amos in this regard (data not shown). The lethality of Amos misexpression was reduced by temporal restriction of expression using hs-Gal4 and a 6-min heat shock at 38°. As described previously, these animals displayed a variety of ectopic sense organs (Huanget al. 2000). However, I observed predominant induction of mechanosensory organs and campaniform sensilla (Figure 6, D and E). Thus, misexpression of Amos efficiently induced the development of mechanosensory organs, which is consistent with the Tft phenotype.
Figure 4.
Tft1 is associated with a duplication and translocation in the 36F-37A region that results in misexpression of the proneural gene amos. (A) Physical map of 100 kb from the 36F3-7 region used for cytological analysis of Tft1/+ polytene chromosomes; the map was modified from Gadfly output (Mungallet al. 2003). Selected hybridizations using the probes labeled “B,” “C,” and “D” are shown in B-D, respectively; the positions of 36E (arrowhead) and 37A (arrow) on the wild-type homolog are indicated. DNA from the region shaded yellow hybridized to an additional band in the vicinity of 37A, indicating that the Tft aberration involves a duplication and translocation of sequences from 36F3-7 to 37A. This is most clearly observed in exceptional chromosome figures where the homologs have separated (B); a second site of hybridization is seen on one of the two homologs (asterisks). The proximal limit of the aberration was not determined and lies to the left of the sequence analyzed here. The distal limit terminates in the vicinity of amos (in red), but its structure is complex. Both probe C (including the amos transcription unit) and a probe including the next distal 5 kb of sequence (not shown) showed modest evidence of duplication [C, asterisks designate full hybridization; (*) designates partial hybridization near 37A]. That adjacent but nonoverlapping probes showed this behavior suggests that the distal limit of the duplication does not break cleanly, but has one or more additional anomalies associated with it. The distal limit is therefore shaded in fading yellow. Probe D is distal to the duplicated region and hybridizes to a single band on each homolog (D, asterisks); aberrant pairing of the homologs at 37A is still observed. Amos is not expressed in the wild-type wing disc (E) but is ectopically expressed in Tft tissue in the presumptive posterior notal region (F, bracket) in an ac/sc-independent manner (G, bracket). Ectopic SOPs (as marked by Hnt) develop from the Amos-misexpressing region of Tft discs (H-J).
Limited cross-activating potential of proneural proteins: Most proneural proteins display a significant amount of promiscuous activity when misexpressed, including a common ability to promote the development of mechanosensory organs. To assess whether this was generally attributable to cross-activation of proneural gene expression, I systematically evaluated the ability of proneural proteins (Ac, Sc, Ato, Amos, and Sens) to activate one another when misexpressed using dpp-Gal4 and appropriate UAS constructs. A subset of these data is shown in Figure 7; the results for Ato and Ac are not shown since their misexpression resulted in only very mild cross-activation, at best, of any of these markers when assayed at the third instar.
As noted before, misexpression of Amos only mildly activates Sc (Figure 7G) and Ac (Figure 7J), even though it strongly induced Ase (Figure 7M) and Sens (Figure 7P). Interestingly, Amos also strongly induced Ato, although primarily only in the wing pouch region (Figure 7D, bracket). In contrast, neither Sc nor Sens detectably activated either Amos or Ato (Figure 7, B, C, E, and F). Only Sens induced an appreciable amount of ectopic Sc (Noloet al. 2000) and Ac (Figure 7, I and L), although this was mostly restricted to the dorsal wing pouch and notal regions of the disc. Since ectopic Sc did not generally induce Ac (Figure 7K; Gomez-Skarmetaet al. 1995), this might reflect independent cross-activation of Sc and Ac by Sens. Finally, all three of these proneural proteins could ectopically activate Ase and Sens (Figure 7, M-R), with their rank order of effectiveness being Amos > Sens > Sc. This correlated directly with their ability to activate neurA101-lacZ (Figure 7, S-U). Bearing in mind that one cannot infer direct regulatory relationships from these experiments, it appears that the ability of all of these proneural proteins to activate the mechanosensory organ is probably not due to activation of Ac/Sc, the normal proneural bHLHs for this process. Rather, it is correlated with their common ability to induce Ase and Sens.
Figure 5.
—Directed misexpression of Amos efficiently generates ectopic proneural clusters and SOPs for external sensory organs. Shown are discs from dppGal4>UAS-amos individuals, with the exception of B, which is wild type (wt). In general, the Amos-misexpressing discs are shown at a slightly lower magnification relative to the wild-type disc due to their overgrowth phenotype. Misexpression of Amos in a stripe along the anterior-posterior border (A) results in a similar stripe of ectopic proneural clusters, as marked by Delta (Dl, B and C), m4-lacZ (stained for β-galactosidase, D) and E(spl)bHLHs (E), as well as strong overcommitment to the SOP fate, as marked by Hnt (F), Sens (G), Ase (H), Neur (I), and Cut (J; dR, dorsal radius). Inset to J shows a wild-type dR stained for Cut for comparison; only a small number of cells are normally labeled. Wild-type expression patterns for all other markers are shown in Figures 2 and 3. (K-P) Amos is downregulated following adoption of the SOP fate. The same disc is doubly stained in A and F; the boxed region is shown at higher magnification in K-M. Note that a higher level of Hnt (green) is found in cells that do not express Amos (red). (N-P) Cells that strongly express Amos (red) express low levels of β-galactosidase (green) in the neurA101-lacZ background, while the cells that express the highest levels of β-galactosidase do not express Amos.
amos activates ectopic mechanosensory neurogenesis in Tft: Although the normal function of amos is to initiate the development of certain embryonic multiple-dendritic neurons and adult olfactory sensilla (Gouldinget al. 2000; Huanget al. 2000), several lines of evidence suggest that it is also responsible for generating the dominant Tft phenotype, which consists of a large number of ectopic adult mechanosensory organs.
Figure 6.
—Adult phenotypes caused by misexpression of Amos. SEMs of (A) wild-type and (B) dpp-Gal4>UAS-amos nota are shown; many ectopic macrochaetae are seen in the latter. They generally die as pupae but occasionally survive to the late pharate adult stage; cuticle deformation is due to its dissection from the pupal case. (C) Phenotype of a small clone of Amos-expressing cells that have been marked with forked. Most such clones show only a bald patch; however, exceptional clones also show a tight cluster of forked bristles, suggesting that Amos induces sensory organs cell-autonomously. No instances of clusters of forked+ bristles were ever observed. (D) A proximal-central portion of a wild-type wing. The wing blade proper is devoid of mechanosensory bristles and has only a small number of campaniform sensilla associated with some of the veins (arrow). (E) hsGal4>UAS-amos fly that was exposed to a 6-min heat shock at the white prepupal stage; the wing is covered with several hundred ectopic mechanosensory and campaniform sensilla.
First, Tft maps to the same cytological location as amos and is associated with a chromosomal duplication and translocation that affects amos. Second, Tft mutants ectopically express Amos in precisely the same region from which ectopic SOPs arise in this mutant. Third, Tft is sensitive to the dosage of da, which encodes an obligate bHLH cofactor for proneural proteins such as Amos. Consistent with this, da similarly suppresses Roi (caused by misexpression of amos; Chanutet al. 2002) and enhances the phenotype of amos deficiencies (Gouldinget al. 2000; Huanget al. 2000). Fourth, deliberate misexpression of Amos phenocopies Tft and very effectively generates ectopic mechanosensory organs (in addition to other types of sense organs). Although I cannot formally exclude the contribution of other genes affected by the aberration at 36F-37A, the collected observations strongly suggest that the Tft phenotype can be satisfactorily accounted for by the ectopic expression of Amos. It should be noted that Modolell and colleagues have come to similar conclusions regarding Tft and have also shown that Tft revertants no longer misexpress Amos and/or are hypomorphic for amos (Villa-Cuestaet al. 2003, accompanying article in this issue). Taken together, these observations strongly indicate that Tft is a gain-of-function allele of amos.
The past year has witnessed not only the simultaneous and independent characterization of Tft (this work and Villa-Cuestaet al. 2003), but also the realization that the classical mutant Rough eye (Roi) is likewise a gain-of-function mutant of amos (Chanutet al. 2002). Therefore, this relatively recently identified gene, whose original characterization was also carried out simultaneously and independently by two laboratories (Gouldinget al. 2000; Huanget al. 2000), is affected by two completely distinct gain-of-function mutants. An even more stunning fact is that both Tft and Roi were first described in the same volume of the Drosophila Information Service in 1952 (Ives 1952; Ritterhoff 1952). The history of amos seems thus to be dominated by coincidences.
Unusual features of mechanosensory neurogenesis induced by amos: A curious feature of ectopic peripheral neurogenesis induced by Tft or UAS-amos is that it very minimally involves Ac and Sc, the endogenous proneural proteins for this process. Tft is not suppressed by complete inactivation of these proneural genes and is not modified by an increase in ac dosage. In addition, Sc and Ac are minimally misexpressed in Tft or in directed Amos misexpression experiments, even though all other PNC and SOP markers tested are strongly induced under these conditions. The failure of Amos to induce Sc or Ac is especially surprising considering the fact that Sens is very strongly induced by Amos, and Sens can ectopically induce Sc and Ac (although only in a subset of disc cells). A possible explanation for this paradox is that the high levels of E(spl)bHLH proteins induced by Amos are responsible for repressing ac and sc (Van Dorenet al. 1994; Jimenez and Ish-Horowicz 1997), although it is also the case that Sens can induce E(spl) expression (Noloet al. 2000).
Interestingly, expression of SOP markers such as Hnt and neurA101-lacZ was often inversely correlated with that of Amos on a cell-by-cell level, even though Amos very strongly induces their expression. Since the effects of Tft (Arnheim 1967) and Amos misexpression are autonomous, this probably does not represent nonautonomous induction or recruitment of SOPs, but rather negative regulation of Amos. This control seems unlikely to reside at the transcriptional level in our experiments involving the Gal4/UAS system, suggesting that Amos protein might be unstable in SOPs. amos mRNA is also apparently rapidly lost from olfactory SOPs (Gouldinget al. 2000), suggesting that amos is negatively regulated at multiple levels shortly after commitment to the SOP fate. This behavior seems to run counter to that of Ac and Sc, which accumulate to elevated levels in SOPs, but may be paralleled by Ato, which is downregulated in maturing chordotonal SOPs (zur Lage and Jarman 1999). More detailed studies are required to determine if there are distinct functional consequences of the apparently different regulation of Ato- and ASC-class proteins in SOPs, or if this reflects some trivial difference in the timing of the differentiation of these different SOPs.
Figure 7.
—Cross-regulatory capabilities of selected proteins with proneural activity. All discs contain dpp-Gal4 and UAS-amos (top row), UAS-sc (middle row), or UAS-sens (bottom row). For reference, the misexpressed protein of choice is visualized in A (Amos), H (Sc), and R (Sens); the wild-type expression patterns of most of these proteins are shown in Figures 2, 3, 4. Ectopic Amos activates Ato in the wing pouch region (D, bracket), very mildly activates Sc (G) and Ac (J), and leads to strong misexpression of Ase (M) and Sens (P). By contrast, neither Sc nor Sens activates Amos (B and C) or Ato (E and F) in the wing disc. Arrows in E and F point to normal endogenous Ato expression in the ventral radius (vR); these discs are identical to wild type with respect to expression of Ato (not shown). Sc negligibly activates Ac (K), while Sens activates both Sc (I) and Ac (L), although only in a subset of Sens-expressing cells. Both Sc and Sens can modestly activate Ase (N and O), and Sc misexpression also results in some ectopic Sens (Q). The proneural strength of these proteins can be rank ordered as Amos > Sens > Sc on the basis of their ability to activate neurA101-lacZ (S-U). This correlates directly with their ability to activate Ase and Sens (M-R) and with the strength of their corresponding adult phenotypes (not shown). D and J, E and K, and I and L are from doubly stained preparations; M and P are the same as Figure 5, G and H.
The ability of Tft/amos to induce closely spaced or even adjacent SOPs and sensory organs suggests that it is able to at least partially overcome or bypass lateral inhibition. This is not simply due to disconnecting a proneural gene from its normal transcriptional control, at least in the case of the Gal4-UAS experiments, since misexpression of Ac or Sc by similar means results in ectopic, but spaced bristles. It is also not a consequence of a failure to activate lateral inhibition, since E(spl) bHLH expression is strongly induced by Amos. It may simply be the case that Amos’ unusually potent proneural activity overwhelms or is not very sensitive to lateral inhibition. Another possibility is that induction of exceptionally high levels of E(spl)m4 (and potentially other Brd family proteins) by Amos might interfere with lateral inhibition, an explanation that might underlie the strong genetic interaction between Tft and Brd. Deliberate misexpression of Brd family genes is known to compromise lateral inhibition (Levitenet al. 1997; Apidianakiset al. 1999; Lai et al. 2000a,b).
Another explanation might lie in the difference between the types of sensory organs normally controlled by ASC and Ato-class proneural proteins. While single SOPs for mechanosensory organs are chosen from individual PNCs of ac- and sc-expressing cells, large numbers of SOPs for chordotonal and olfactory sensilla are instead continuously selected from individual zones of ato- or amos-expressing cells (zur Lage and Jarman 1999; Gouldinget al. 2000). It is conceivable that Ato-class proneural proteins possess an inherent ability to induce the formation of closely spaced sensory organs. Signaling via the epidermal growth factor receptor (EGFR) antagonizes N signaling during SOP determination, and the development of clustered chordotonal organs not only relies upon EGFR signaling but also is strongly correlated with localized expression of rhomboid and presence of dp-ERK (zur Lage and Jarman 1999; Culiet al. 2001). It will be interesting to determine if settings of Amos activity are similarly associated with EGFR signaling and if any mechanistic links can be established between expression of Ato-class proteins and activation of rhomboid transcription and/or phosphorylation of MAP kinase.
Specificity of proneural activity: When misexpressed, proneural proteins often induce the ectopic differentiation of sensory structures whose development they do not normally control. For example, Sc can promote many aspects of eye development in the absence of Ato; Sc and Ato can weakly induce the differentiation of MD neurons; and Amos can promote the differentiation of chordotonal organs. Notably, all proneural proteins have the ability to promote the formation of mechanosensory organs (Jarmanet al. 1993; Hinzet al. 1994; Gouldinget al. 2000; Huanget al. 2000; Sunet al. 2000).
Several mutually compatible explanations for their common ability to induce mechanosensory neurogenesis have been put forth. First, experiments with Da suggested that mechanosensory organs might represent a “default” output for neurogenesis. Since Da is the heterodimeric partner for all proneural bHLH proteins, it is not expected to exhibit a subtype specificity. Nevertheless, misexpression of Da induces only the development of external sensory organs (Jarman and Ahmed 1998). Second, most proneural proteins are known to exhibit a phase of transcriptional auto-activation (Martinez and Modolell 1991; Van Dorenet al. 1992; Culi and Modolell 1998; Sunet al. 1998). Although the binding specificities of the proneural proteins are distinct, particularly between the ASC and Ato subclasses, high levels of ectopic proteins could conceivably result in some direct cross-activation of ac/sc. Once initiated, auto-activation by Ac and/or Sc might then be responsible for subsequent mechanosensory organ formation. Third, it is known that the transcription factor Sens, which itself has inherent proneural activity, is downstream of both subfamilies of proneural proteins (Noloet al. 2000; Frankfortet al. 2001). Thus, it may be that the activation of a common downstream target by different proneural proteins could explain how they can all activate mechanosensory neurogenesis.
My data do not speak to the first of these explanations. However, they do suggest that relatively little cross-activation occurs at the level of proneural bHLH gene expression. Although Amos is perhaps the strongest inducer of mechanosensory organs among proneural proteins it does not do so through induction of intermediary proneural clusters of Ac/Sc. Even Sc fails to significantly cross-activate Ac (Gomez-Skarmetaet al. 1995), although Sc and Ac have largely indistinguishable DNA-binding properties in vitro (Singsonet al. 1994). This is not to say that proneural proteins cannot influence each other’s expression, since ectopic Amos can strongly activate Ato in the pouch region of the wing disc and in the vicinity of the morphogenetic furrow of the developing eye disc (Chanutet al. 2002). This particular ability might reflect their related DNA-binding domains; however, it should be noted that Ato does not reciprocally activate Amos (data not shown). Ac, Sc, and Sens also fail to activate either Amos or Ato. So in general, there is limited promiscuity in cross-activation of proneural bHLH proteins.
A common activity of Ato-class and ASC-class bHLH proteins is instead their ability to induce Ase and Sens expression; Sens also induces Ase. As misexpression of either Ase or Sens suffices to initiate mechanosensory organ development, their activation may be key to promiscuous induction of mechanosensory organs. In principle, initiation of an Ase/Da-Sens feedback loop might be responsible for triggering a mechanosensory-type developmental program. Consistent with this scenario, ase is required for ectopic neurogenesis in Tft although ac/sc are not (A. Garcia-Bellido, personal communication cited in Campuzanoet al. 1985; Villa-Cuestaet al. 2003), and Sens is strictly required for bristle formation by ectopic Sc (Noloet al. 2000). The precise contribution of ase to mechanosensory neurogenesis remains in question though, as it is not normally required for the development of most bristles. In addition, both L’sc and Sc can generate ectopic bristles in cells that carry a deletion of the AS-C (and thus lack ase; Hinzet al. 1994; Culi and Modolell 1998). It is conceivable that proneural proteins might generically substitute for ase in these experimental conditions.
Dominant gain-of-function alleles in Drosophila: Although they arise infrequently, dominant gain-of-function alleles can produce dramatic phenotypes that are easily identified, even in the course of unrelated studies. This explains why they are generally among the oldest Drosophila mutants known (Lindsley and Zimm 1992). Although in some cases these mutants have been useful reagents for studying various developmental processes, in other cases, their effects are neomorphic and not informative of normal development. Perhaps for this reason, dominant gain-of-function mutants have generally been treated with suspicion or even de facto discrimination by Drosophila geneticists. Indeed, many “old” dominant mutants have escaped the attention of Drosophila developmental biologists, even though they often affect processes (such as wing, eye, and bristle development) that are otherwise the subject of intense scrutiny. This has remained true in spite of the fact that misexpression studies and systematic gain-of-function genetic screens have become de rigeur since the inception of the versatile Gal4/UAS system in the past decade (Brand and Perrimon 1993; Rørth 1996).
Only very recent years have witnessed the molecular characterization of a number of classical dominant gain-of-function Drosophila mutants, including Rough eye (Chanutet al. 2002), Glazed (Brunneret al. 1999), Lyra (Noloet al. 2001), Drop (Mozer 2001), Beadex (Milánet al. 1998; Shoreshet al. 1998; Zenget al. 1998), and Scutoid (Fuseet al. 1999). In these examples, the mutant phenotype appears to be due to the misexpression of an important regulatory molecule (including transcription factors and a morphogen). Thus, while these mutations are all neomorphic, they are nonetheless useful in that they identify “interesting” genes. Many other commonly utilized dominant mutations—Curly, Tubby, Additional Veins, Blunt short bristle, and Plexate, for example—remain to be characterized. A cursory examination of the FlyBase archive reveals >50 other uncharacterized adult-dominant Drosophila mutants for which mutant stocks are publicly available; about one-half of these mutants have been extant for nearly 50 years or more (FlyBase 1998). Undoubtedly, this collection of mutants, once properly analyzed, will be found to affect many other interesting genes as well.
The history of amos is particularly instructive in this context. Its recent discovery relied upon molecular approaches (degenerate PCR and two-hybrid screening) and specific genetic lesions in amos have yet to be described. Nevertheless, the existence of an amos-like function had been genetically inferred for many years, since certain neurons persist in embryos mutant for both the AS-C and ato, and much of the olfactory system develops independently of these proneural genes. Since the development of all of these neurons is still sensitive to manipulation of Da and/or EMC levels, this suggested the existence of an additional proneural bHLH. Loss of amos function produces phenotypes complementary to AS-C; ato mutants, suggesting it is the “missing” proneural gene (Gouldinget al. 2000; Huanget al. 2000). Had Roi and/or Tft been studied earlier, amos might have been discovered long ago. In this author’s opinion, the very history of amos justifies the study of other long-neglected dominant mutants.
I thank Francoise Chanut, Adina Bailey, and Julia Serano for useful discussions of this work; Juan Modolell for communications regarding Tft prior to publication; and especially Todd Laverty for performing in situ hybridizations to polytene chromosomes. I also acknowledge the following for generous gifts of antibodies and fly stocks: Andrew Jarman, Yuh Nung Jan, Saray Bray, Hugo Bellen, Francoise Chanut, James Posakony, Jose de Celis, the Bloomington Stock Center, and the Developmental Hybridoma Studies Bank. I acknowledge the gracious support of Gerald Rubin and the Damon Runyon Cancer Research Foundation, DRG 1632.
• Communicating editor: T. C. Kaufman
• Received September 9, 2002.
• Accepted January 8, 2003.
View Abstract
|
__label__1
| 0.500169
|
Huntress #2 Review
Huntress hates human traffickers. Like, really hates them.
Paul Levitz and Marcus To continue Huntress' first New 52 adventure this month and once again deliver. Interestingly, their roles have somewhat reversed, with To's work being the star of the show while Levitz's script gets a little wobbly from time to time. To's flair for dynamic action, panel composition, and body language is fully present in issue #2, with the characters feeling lively and full of weight. While his facial expressions could use some work here, his overall knack for creating interesting pages and defined action sequences win out.
Levitz delivers on the characterization of Helena, but the pacing of this issue holds it back. The jumps between scenes are quick and jarring, but after flipping the book shut, you'll be at a loss for what has actually progressed in this issue. That's not to say the plot is treading water, but there's never a sense that anything anyone says is actually building towards something bigger, other than the eventual confrontation that will happen two issues from now. The supporting cast and villains are left where they began in issue #1, but Huntress herself retains all the spark, snark and strength that Levitz gave her last time around. One other gripe I have, though small, is that characters speak in English that's supposedly translated from Italian, yet there are numerous instances where the dialog tosses in some Italian for good measure. As I said, it's a minor gripe but one of those nagging factors that will drive the more careful readers nuts.
Huntress #2 is another decent win for female-led books in the New 52. If the coming issues can get the plot back on track and retain the same great characterization, this series could be a nice counterpoint to all of the critics pointing out the missteps with DC's other female characters.
IGN Logo
|
__label__1
| 0.871144
|
Power Of Packaging In Consumer Choices
January 7, 2014
Appearance Of Package Impacts Buying Decisions Of Consumers
University of Miami
Researchers from the University of Miami and California Institute of Technology show how the brain considers both visual cues and taste preferences when making everyday food choices
When it comes to deciding what food to eat, one might expect that people's choices will be driven by past experience and personal preference, but how does the general appearance of the package impact buying decisions of consumers?
Scientists believe colorful or otherwise noticeable food packages predispose where people look, how long they examine certain options and ultimately, influence which foods they choose, according to a new study published in the Proceedings of the National Academy of Sciences.
"When choice options are presented simultaneously, eye movements are considered a good predictor of our economic decisions," says Milica Mormann, senior research scientist at the University of Miami School of Law and co-author of the study. "The big idea here is that perceptual processes happen in the brain in parallel with economic value computations and thus influence how economic decisions are made."
"These findings can be applied to guide the design of choice environments, to 'nudge' people toward making optimal choices, be it selecting a healthy food option to eat or the best retirement plan to invest in," Mormann says. In the study, Mormann and researchers from the California Institute of Technology, Pasadena, CA asked participants to search for and choose a snack food item to eat -- such as M&Ms or Twix -- out of four simultaneously presented snack alternatives. Eye-tracking technology recorded what items people were looking at, in real time.
Images of food items were also analyzed using novel neuro-computational simulation of human attentional processes to determine which items attract attention due to the color, brightness and other visual features of their packaging. The experiment showed that visual fixations are driven by a combination of visual attractiveness and preference information. In fact, the visual attractiveness of product packaging influences where people look in a ratio of 1:3 or 2:3 compared to consumer preferences. In other words, visual attractiveness has a smaller, but significant, influence than food preferences on consumer decisions.
Importantly, these findings allowed the scientists to accurately predict eye-movement patterns and subsequent food choices using only the images of food items and participants' stated liking ratings of these food items. The accuracy of prediction was higher when both visual features and preferences are accounted for than when only the preference information, or asking people what they like, was considered.
Most existing studies on how people make choices do not examine what is visually appealing but, instead, focus on what is economically attractive. A separate body of literature, dedicated to perceptual decision-making, examines what people perceive and pay attention to. The current study bridges these two research approaches to build a more comprehensive understanding of how people make everyday choices.
"Surprisingly, the traditional research approach tends to ignore other, fundamental influences that could impact decision makers at the time of choice, such as how people perceive choice options and how much attention they allocate to different options," Mormann says.
The new study makes an important observation: during the economic choice process the brain merges and reconciles competing types of inputs, including, but not limited to, the perceptual and taste preference information.
On the Net:
|
__label__1
| 0.548965
|
39872274 vb-script
Published on
• Be the first to comment
• Be the first to like this
No Downloads
Total Views
On Slideshare
From Embeds
Number of Embeds
Embeds 0
No embeds
No notes for slide
39872274 vb-script
1. 1. AL A Quick Introduction RI to Programming TEA chapter covering the basics of VBScript is the best place to begin this book. This is because of the MAtype of language VBScript is and the kind of users the authors see turning to it. In this chapter, youget a crash course in programming basics. You might not need this chapter because you’ve come toVBScript with programming skills from another language (Visual Basic, Visual Basic .NET, C, C++,Delphi, C#) and are already both familiar with and comfortable using programming terminology. DIn that case, feel free to skip this chapter and move on to the next one. However, if you come froma non-programming background, then this chapter will give you the firm foundation you need to TEbegin using VBScript confidently.If you’re still reading, chances are you fall into one of three distinct categories: GH ❑ You’re a Network/Systems administrator who probably wants to use VBScript and the Windows Script Host or PowerShell to write logon scripts or to automate administration RI tasks. ❑ You might be a web designer who feels the need to branch out and increase your skill set, PY perhaps in order to do some ASP work. ❑ You’re interested in programming (possibly Visual Basic or Visual Basic .NET) and want to check it out before getting too deeply involved. COProgramming is a massive subject. Over the years countless volumes have been written about it,both in print and on the Internet. In this chapter, in a single paragraph, we might end up introduc-ing several unfamiliar concepts. We’ll be moving pretty fast, but if you read along carefully, tryingout your hand at the examples along the way, you’ll be just fine.Also, do bear in mind that there will be a lot that we don’t cover here, such as: ❑ Architecture ❑ System design ❑ Database design
2. 2. Chapter 1: A Quick Introduction to Programming ❑ Documenting code ❑ Advanced testing, debugging, and beta testing ❑ Rollout and support Think of this chapter as a brief introduction to the important building blocks of programming. It certainly won’t make you an expert programmer overnight, but it will hopefully give you the know-how you’ll need to get the most out of the rest of the book.Variables and Data Types In this section, you’ll quickly move through some of the most basic concepts of programming, in particular: ❑ Using variables ❑ Using comments ❑ Using built-in VBScript functions ❑ Understanding syntax issuesUsing Variables Quite simply, a variable is a place in the computer memory where your script holds a piece (or pieces) of information, or data. The data stored in a variable can be pretty much anything. It may be something simple, like a small number, like 4, something more complex, like a floating-point number such as 2.3, or a much bigger number like 981.12932134. Or it might not be a number at all and could be a word or a combination of letters and numbers. In fact, a variable can store pretty much anything you want it to store. Behind the scenes, the variable is a reserved section of the computer’s memory for storing data. Memory is temporary — things stored there are not stored permanently like they are when you use the hard drive. Because memory is a temporary storage area, and variables are stored in the computer’s memory, they are therefore also temporary. Your script will use variables to store data temporarily that the script needs to keep track of for later use. If your script needs to store that data permanently, it would store it in a file or database on the computer’s hard disk. To make it easier for the computer to keep track of the millions of bits of data that are stored in memory at any given moment, the memory is broken up into chunks. Each chunk is exactly the same size, and is given a unique address. Don’t worry about what the memory addresses are or how you use them because you won’t need to know any of that to use VBScript, but it is useful to know that a variable is a reserved set of one or more chunks. Also, different types of variables take up different amounts of memory. In your VBScript program, a variable usually begins its lifecycle by being declared (or dimensioned) before use.2
3. 3. Chapter 1: A Quick Introduction to Programming It is not required that you declare all of the variables you use. By default, VBScript allows you to use undeclared variables. However, it’s strongly recommended that you get into the good habit of declaring all of the variables you use in your scripts. Declaring variables before use makes code easier to read and to debug later. Just do it!By declaring variables you also give them a name in the process. Here’s an example of a variabledeclaration in VBScript. Dim YourNameBy doing this, you are in fact giving the computer an instruction to reserve some memory space for youand to name that chunk YourName. From now on, the computer (or, more accurately, the VBScriptengine) keeps track of that memory for you, and whenever you use the variable name YourName, it willknow what you’re talking about.Variables are essential to programming. Without them you have no way to hold all the data that yourscript will be handling. Every input into the script, output from the script, and process within the scriptuses variables. They are the computer’s equivalent of the sticky notes that you leave all over the placewith little bits of information on them. All the notes are important (otherwise why write them?) but theyare also temporary. Some might become permanent (so you take a phone number and write it down inyour address book or contact list), while others are thrown away after use (say, after reminding you to dosomething). This is how it works with variables, too. Some hold data that you might later want to keep,while others are just used for general housekeeping and are disposed of as soon as they’re used.In VBScript, whenever you have a piece of information that you need to work with, you declare a vari-able using the exact same syntax you saw a moment ago. At some point in your script, you’ll need to dosomething with the memory space you’ve allocated yourself (otherwise, what would be the point ofdeclaring it?). And what you do with a variable is place a value in it. This is called initializing the vari-able. Sometimes you initialize a variable with a default value. Other times, you might ask the user forsome information, and initialize the variable with whatever the user enters. Alternatively, you mightopen a database and use a previously stored value to initialize the variable. When we say database, we don’t necessarily mean an actual database but any store of data — it might be an Internet browser cookie or a text file that we get the data from. If you are dealing with small amounts of data a cookie or text file will suffice, but if you are dealing with a lot of data you need the performance and structure that a database offers.Initializing the variable gives you a starting point. After it has been initialized, you can begin making useof the variable in your script.Here’s a very simple VBScript example. Dim YourName ‘ Above we dimensioned the variable YourName = InputBox(“Hello! What is your name?”) ‘ Above we ask for the user’s name and initialize the variable MsgBox “Hello “ & YourName & “! Pleased to meet you.” ‘ Above we display a greeting containing the user’s nameRightly so, you’re now probably wondering what all this code means. Last time, you were showed oneline and now it’s grown to six. 3
4. 4. Chapter 1: A Quick Introduction to Programming All of the examples in this chapter are designed so that you can run them using the Windows Script Host (WSH). The WSH is a scripting host that allows you to run VBScript programs within Windows. WSH allows you to try out these example programs for yourself. You may already have WSH installed. To find out, type the previous example script into a text editor, save the file as TEST.VBS (it must have the .VBS extension, and not a .TXT), and double-click the file in Windows Explorer. If the script runs, then you’re all set. If Windows does not recognize the file, then you need to download and install WSH from http://msdn2.microsoft.com/en-us/library/ms950396.aspx.Using Comments You already know what the first line of code in the previous block does. It declares a variable for use called YourName. The second line in the code is a comment. In VBScript, any text preceded by the single quote character (‘) is treated as a comment, which means that the VBScript engine completely ignores the text, which begs the question why bother typing it in at all? It doesn’t contribute to the execution of the script, right? This is absolutely correct, but don’t forget one of the most important principles of programming: It is not just computers that may have to read script. It is equally important to write a script with human readers in mind as it is to write with the computer in mind. Of course, none of this means you should for one moment forget that when you write scripts, you must do so with the computer (or, more specifically, the script engine) in mind. If you don’t type the code cor- rectly (that is, if you don’t use the proper syntax), the script engine won’t be able to execute the script. However, once you’ve written some useful scripts, you’ll probably need to go back to make some changes to a script you wrote six months or a year ago. If you didn’t write that code with human readers, as well as computers, in mind it could be pretty difficult to figure out what you were thinking and how you decided to solve the problems at the time you wrote the script. Things can get worse. What happens when you or one of your coworkers has to make some changes to a script you wrote many months ago? If you did not write that script to be both readable and maintainable, others who use your code will encounter difficulties deciphering it — no matter how well written the actual computer part of the code is. Adding comments to your code is just one part of making sure code is clear and readable. There are many other things that you can do: ❑ Choose clear, meaningful variable names. ❑ Indent code for clarity. ❑ Make effective use of white space. ❑ Organize the code in a logical manner. All of these aid human-readability and are covered later, but clear, concise comments are by far the most important. However, too much of a good thing is never good and the same is true for comments. Over- burdening code with comments doesn’t help. Remember that if you are scripting for the Web that all the code, including the comments, are downloaded to the browser, so unnecessary comments may adversely affect download times. You learn about some good commenting principles later in this chapter, but for now just be aware of the fact that the comment in line 2 of the script is not really a good comment for everyday use. This is because, to any semi-experienced programmer, it is all too obvious that what you are doing is declaring4
5. 5. Chapter 1: A Quick Introduction to Programming the YourName variable on the code line above. However, throughout this book you’ll often see the code commented in a similar way. This is because the point of the code is to instruct the reader in how a par- ticular aspect of VBScript programming works, and the best way to do that is to add comments to the code directly. It removes ambiguity and keeps the code and comments together. Also worth noting is that comments don’t have to be on a separate line. Comments can also follow the code, like so: Dim YourName ‘ initialize the variable YourName = InputBox(“Hello! What is your name?”) ‘ ask for the user’s name MsgBox “Hello “ & YourName & “! Pleased to meet you.” ‘ display a greeting This works in theory but it isn’t as clear as keeping the comments on separate lines in the script.Using Built-in VBScript Functions OK, back to the script. Take a look at line 3. YourName = InputBox(“Hello! What is your name?”) Here you are doing two things at once. First, you’re initializing the variable. You could do it directly, like this: YourName = “Fred” However, the drawback with this is that you’re making the arbitrary decision that everyone is called Fred, which is ideal for some applications but not for others. If you wanted to assign a fixed value to a variable, such as a tax rate, this would be fine. Dim TaxRate TaxRate = 17.5 Because you want to do something that gives the user a choice, you should employ the use of a function, called InputBox. This function and all the others are discussed in later chapters, but for now all you need to know is that InputBox is used to display a message in a dialog box, and it waits for the user to input text or click a button. The InputBox generated is displayed in Figure 1-1. Figure 1-1 The clever bit is what happens to the text that the user types into the input box displayed — it is stored in the variable YourName. 5
6. 6. Chapter 1: A Quick Introduction to Programming Line 4 is another comment. Line 5 is more code. Now that you’ve initialized this variable, you’re going to do something useful with it. MsgBox is another built-in VBScript function that you will probably use a lot during the course of your VBScript programming. Using the MsgBox function is a good way to introduce the programming concept of passing function parameters, also known as arguments. Some functions don’t require you to pass parameters to them while others do. This is because some functions (take the Date function as an example — this returns the current date based on the system time) do not need any additional information from you in order to do their job. The MsgBox function, on the other hand, dis- plays a piece of information to the user in the form of a dialog box, such as the one shown in Figure 1-2. Figure 1-2 You have to pass MsgBox a parameter because on its own it doesn’t have anything useful to display (in fact, it will just bring up a blank pop-up box). The MsgBox function actually has several parameters, but for now you’re just going to look at one. All of the other parameters are optional parameters.Understanding Syntax Issues Take another look at line 5 and you’ll probably notice the ampersand (&). The ampersand is a VBScript operator, and is used to concatenate (join) pieces of text together. To concatenate simply means to “string together.” This text can take the form of either a literal or a variable. A literal is the opposite of a variable. A variable is so named because it is exactly that — a variable — and can change throughout the lifetime of the script (a script’s lifetime is the time from when it starts executing, to the time it stops). Unlike a variable, a literal cannot change during the lifetime of the script. Here is line 5 of the script again. MsgBox “Hello “& YourName & “! Pleased to meet you.” An operator is a symbol or a word that you use within your code that is usually used to change or test a value. Other operators include the standard mathematical operators (+, -, /, *), and the equals sign (=), which can actually be used in either a comparison or an assignment. So far, you’ve used the equals sign as an assignment operator. Later in this chapter you’ll find out more about operators. Now take a closer look at variables. Remember how we said that a variable is a piece of reserved memory? One question you might have is, How does the computer know how large to make that piece of memory? Well, again, in VBScript this isn’t something that you need to worry about and it is all handled automatically by the VBScript engine. You don’t have to worry in advance about how big or small you need to make a variable. You can even change your mind and the VBScript engine will dynamically change and reallocate the actual memory addresses that are used up by a variable. For example, take a quick look at this VBScript program.6
7. 7. Chapter 1: A Quick Introduction to Programming ‘ First declare the variable Dim SomeVariable ‘ Initialize it with a value SomeVariable = “Hello, World!” MsgBox SomeVariable ‘ Change the value of the variable to something larger SomeVariable = “Let’s take up more memory than the previous text” MsgBox SomeVariable ‘ Change the value again SomeVariable = “Bye!” MsgBox SomeVariableEach time the script engine comes across a variable, the engine assigns it the smallest chunk of memoryit needs. Initially the variable contains nothing at all so needs little space but as you initialize it with thestring “Hello, World!” the VBScript engine asks the computer for more memory to store the text. Butagain it asks for just what it needs and no more. (Memory is a precious thing and not to be wasted.)Next, when you assign more text to the same variable, the script engine must allocate even more mem-ory, which it again does automatically. Finally, when you assign the shorter string of text, the scriptengine reduces the size of the variable in memory to conserve memory.One final note about variables: Once you’ve assigned a value to a variable, you don’t have to throw itaway in order to assign something else to the variable as well. Take a look at this example. Dim SomeVariable SomeVariable = “Hello” MsgBox SomeVariable SomeVariable = SomeVariable & “, World!” MsgBox SomeVariable SomeVariable = SomeVariable & “ Goodbye!” MsgBox SomeVariableNotice how in this script, you each time keep adding the original value of the variable and adding someadditional text to it. You tell the script engine that this is what you want to do by also using the name of theSomeVariable variable on the right side of the equals sign, and then concatenating its existing value withan additional value using the ampersand (&) operator. Adding onto the original value works with num-bers, too (as opposed to numbers in strings) but you have to use the + operator instead of the & operator. Dim SomeNumber SomeNumber = 999 MsgBox SomeNumber SomeNumber = SomeNumber + 2 MsgBox SomeNumber SomeNumber = SomeNumber + 999 MsgBox SomeNumber 7
8. 8. Chapter 1: A Quick Introduction to Programming Here are the resulting message boxes generated by this code. The first is shown in Figure 1-3. Figure 1-3 The second message box is shown in Figure 1-4. Figure 1-4 The final message box is shown in Figure 1-5. Figure 1-58
9. 9. Chapter 1: A Quick Introduction to Programming You can store several different types of data in variables. These are called data types and so far you’ve seen two: ❑ String ❑ Integer You’ve also seen a single-precision floating-point number in the tax rate example. We’ll be covering all of them later on in the book. For now, just be aware that there are different data types and that they can be stored in variables.Flow Control When you run a script that you have written, the code executes in a certain order. This order of execution is also known as flow. In simple scripts such as the ones you looked at so far, the statements simply execute from the top down. The script engine starts with the first statement in the script, executes it, moves on to the next one, and then the next one, and so on until the script reaches the end. The execution occurs this way because the simple programs you’ve written so far do not contain any branching or looping code.Branching Take a look at a script that was used earlier. Dim YourName ‘Above we initialized the variable YourName = InputBox(“Hello! What is your name?”) ‘Above we ask for the user’s name and initialize the variable MsgBox “Hello “ & YourName & “! Pleased to meet you.” ‘Above we display a greeting containing the user’s name If you save this script in a file with a .vbs extension, and then execute it using the Windows Script Host, all of the statements will be executed in order from the first statement to the last. Note that it was previously mentioned that all of the statements will be executed. However, this isn’t what you always want. There is a technique that you can use to cause some statements to be executed, and some not, depending on certain conditions. This technique is called branching. VBScript supports a few different branching constructs, and they are covered in detail in Chapter 5, but here we only cover the simplest and most common one, which is the If...Else...End If construct. Take a look at this modified code example. 9
10. 10. Chapter 1: A Quick Introduction to Programming Dim YourName Dim Greeting YourName = InputBox(“Hello! What is your name?”) If YourName = “” Then Greeting = “OK. You don’t want to tell me your name.” Else Greeting = “Hello, “& YourName & “, great to meet you.” End If MsgBox Greeting Walking through the code, you do the following: 1. You declare the two variables that you are going to use: Dim YourName Dim Greeting YourName = InputBox(“Hello! What is your name?”) You ask the user for some input, again using the InputBox function. This function expects one required parameter, the prompt text (the text that appears on the input box). It can also accept several optional parameters. Here, you only use the one required parameter. Note that the parameter text that you passed “Hello! What is your name?” is displayed as a prompt for the dialog box. The InputBox function returns the value that the user types, if any. If the user does not type anything or clicks the Cancel button (both do the same thing), then InputBox returns a zero-length string, which is a strange kind of programming concept that basically means that it returns text that doesn’t actually contain any text. Your script stores the result of the InputBox function in the YourName variable. 2. You come to the actual loop you’re going to use: If YourName = “” Then Greeting = “OK. You don’t want to tell me your name.” Else Greeting = “Hello, “& YourName & “, great to meet you.” End If This code presents the VBScript engine with an option that is based on what the user typed (or didn’t type) into the input box. The first line tests the input from the user. It tests to see if the input that is stored in the variable YourName is a zero-length string. If it is, the next line of code is run and the variable Greeting is assigned a string. Figure 1-6 shows the message displayed if the user doesn’t type his or her name into the InputBox.10
11. 11. Chapter 1: A Quick Introduction to Programming Figure 1-6 3. What happens if the user does (as you expect) type something into the input box? Well, this is where the next line comes in. Else You can actually begin to read the code and in fact doing this helps it to make sense. What the whole loop actually means is that if the value of variable YourName is a zero-length string, then assign the variable Greeting with one value; however, if it contains something else, do some- thing else (assign Greeting a different value). This doesn’t protect your script from users enter- ing data like numbers of non-alphabet characters into the test box, although you could code for all these conditions if you wanted to. 4. The final line of the code uses the MsgBox function to display the value of the variable Greeting. Notice that both lines of code assign a value to the Greeting variable. However, only one of these lines will actually execute in any one running of the script. This is because the If...Else...End If block makes an either/or decision. Either a given condition is True, or it is False. There’s no way it can be neither (not a string that contains text nor a zero-length string) or both (a zero-length string that contains text). If it is True, then the script engine will execute the code between the If and Else statements. If it is False, then it will execute the code between the Else and End If statements.So, what the complete script does is test the input, and then executes different code, depending on theresult of that test, and hence the term branching. Using this technique allows your script to adapt to theunpredictable nature of the input. Compare the intelligent script to the following one, which looks prettylame. Dim YourName Dim Greeting YourName = InputBox(“Hello! What is your name?”) Greeting = “Hello, “& YourName & “, great to meet you.” MsgBox GreetingThis script is just plain dumb because it does not contain any branching logic to test the input; so whenthe user does something unpredictable, such as clicking the Cancel button, or not entering any name atall, the script does not have the ability to adapt. Compare this to your intelligent script, which is capableof adapting to the unpredictability of input by testing it with If...Else...End If branching. 11
12. 12. Chapter 1: A Quick Introduction to Programming Before you move on to looping, you should know a few other things about If...Else...End If: ❑ The block of code containing the If...Else...End If is known as a block of code. A block is a section of code that has a beginning and an end, and it usually contains keywords or state- ments at both the beginning and the end. In the case of If...Else...End If, the If statement marks the beginning of the block, while the End If marks the end of the block. The script engine requires these beginning and ending statements, and if you omit them, the script engine won’t understand your code and won’t allow your script to execute. Over the course of this book you will encounter many different types of code blocks in VBScript. To confuse matters, the term “block of code” is often used informally to describe any group of lines of code. As a rule, “block of code” will refer to lines of code that work together to achieve a result. ❑ Notice that the lines of code that are inside the block itself are indented by four spaces. This is an extremely important concept but not for the reason you might think. This indenting has nothing whatsoever to do with the script engine — it doesn’t care whether you add four spaces, 44 spaces, or none at all. This indenting is for the benefit of any humans who might be reading your code. For example, the following script is completely legal and will execute just fine: Dim YourName Dim Greeting YourName = InputBox(“Hello! What is your name?”) If YourName = “” Then Greeting = “OK. You don’t want to tell me your name.” Else Greeting = “Hello, “& YourName & “, great to meet you.” End If MsgBox Greeting However, this code is very difficult to read. As a general rule of thumb, you indent code by four spaces whenever a line or series of lines is subordinate to the lines above and below it. For ex- ample, the lines after the If clause and the Else clause belong inside the If...Else...End If block, so you indent them to visually suggest the code’s logical structure. Presentation, while having no bearing whatsoever on how the computer or script engine handles your code, is very important when it comes to how humans read it. You should be able to look at the code and get a sense for how it is organized and how it works. By seeing the indentations inside the If...Else...End If block, you can not only read the code, but also “see” the branching logic at that point in the code. Indenting is only one element of programming style, but learning and following proper style and layout is essential for any programmer who wants to be taken seriously. ❑ The Else part of the block is optional. Sometimes you want to test for a certain condition, and if that condition is True, execute some code, but if it’s False, there’s no code to execute. For example, you could add another If...End If block to your script.12
13. 13. Chapter 1: A Quick Introduction to ProgrammingDim YourNameDim GreetingYourName = InputBox(“Hello! What is your name?”)If YourName = “” Then Greeting = “OK. You don’t want to tell me your name.”Else Greeting = “Hello, “ & YourName & “, great to meet you.”End IfIf YourName = “Fred” Then Greeting = Greeting & “ Nice to see you Fred.”End IfMsgBox Greeting❑ The If...Else...End If block can be extended through the use of the ElseIf clause, and through nesting. Nesting is the technique of placing a block of code inside of another block of code of the same type. The following variation on your script illustrates both concepts:Dim YourNameDim GreetingYourName = InputBox(“Hello! What is your name?”)If YourName = “” Then Greeting = “OK. You don’t want to tell me your name.”ElseIf YourName = “abc” Then Greeting = “That’s not a real name.”ElseIf YourName = “xxx” Then Greeting = “That’s not a real name.”Else Greeting = “Hello, “& YourName & “, great to meet you.” If YourName = “Fred” Then Greeting = Greeting & “ Nice to see you Fred.” End IfEnd IfMsgBox Greeting Once again, seeing how the code has been indented helps you to identify which lines of code are subordinate to the lines above them. As code gets more and more complex, proper indenting of the code becomes vital as it will become harder to follow.❑ Even though the branching logic you are adding to the code tells the script to execute certain lines of code while not executing others, all the code must still be interpreted by the script engine (including the code that’s not executed). If any of the code that’s not executed contains any syntax errors, the script engine will still produce an error message to let you know. 13
14. 14. Chapter 1: A Quick Introduction to ProgrammingLooping Branching allows you to tell the script to execute some lines of code, but not others. Looping, on the other hand, allows you to tell the script to execute some lines of code over and over again. This is particularly useful in two situations: ❑ When you want to repeat a block of code until a condition is True or False ❑ When you want to repeat a block of code a finite number of times There are many different looping constructs, but this section focuses on only two of them: ❑ The basic Do...Loop While loop ❑ The basic For...Next loopUsing the Do…Loop While Loop This section takes a look at the Do...Loop While construct and how it can be used to repeatedly execute a block of code until a certain condition is met. Take a look at the following modification of the example script: Dim Greeting Dim YourName Dim TryAgain Do TryAgain = “No” YourName = InputBox(“Please enter your name:”) If YourName = “” Then MsgBox “You must enter your name to continue.” TryAgain = “Yes” Else Greeting = “Hello, “& YourName & “, great to meet you.” End If Loop While TryAgain = “Yes” MsgBox Greeting Notice the block of code that starts with the word Do and ends with the line that starts with the word Loop. The indentation should make this code block easy to identify. This is the definition of the loop. The code inside the loop will keep being executed until at the end of the loop the TryAgain variable equals “No”. The TryAgain variable controls the loop. The loop starts at the word Do. At the end of the loop, if the TryAgain variable equals “Yes”, then all the code, starting at the word Do, will execute again. Notice that the top of the loop initializes the TryAgain variable to “No”. It is absolutely essential that this initialization take place inside the loop (that is, between the Do and Loop statements). This way, the variable is reinitialized every time a loop occurs. If you didn’t do this, you would end up with what’s called an infinite loop. They are always bad. At best, the user is going to have to exit out of the program in an untimely (and inelegant) way because, as the name suggests, the loop is infinite. At worse, it can crash the system. You want neither and you want to try to avoid both in your code.14
15. 15. Chapter 1: A Quick Introduction to ProgrammingTake a look at why the TryAgain = “No” line is essential to preventing an infinite loop. Going throughthe script line by line: 1. This first line starts the loop. Do This tells the script engine that you are starting a block of code that will define a loop. The script engine will expect to find a loop statement somewhere further down in the script. This is similar to the If...End If code block because the script engine expects the block to be defined with beginning and ending statements. The Do statement on a line all by itself means that the loop will execute at least once. Even if the Loop While statement at the end of the block does not result in a loop around back to the Do line, the code inside this block will be executed at least one time. 2. Moving on to the second line of code, you initialize the “control” variable. It’s called the “con- trol” variable because it ultimately controls whether or not the code block loops around again. You want to initialize this variable to “No” so that, by default, the loop will not loop around again. Only if a certain condition is met inside the loop will you set TryAgain to “Yes”. This is yet another strategy in an ever-vigilant desire to expect the unexpected. Do TryAgain = “No” 3. The next line of code should look familiar. You use the InputBox function to ask the user to enter a name. You store the return value from the function in the YourName variable. Whatever the user types, unless they type nothing, will be stored in this variable. Put another way, the script receives some external input — and remember that we said input is always unpredictable: Do TryAgain = “No” YourName = InputBox(“Please enter your name:”) 4. In the next part of the code, you test the input. The line If YourName = “ “ Then tests to see if the user typed in their name (or at least some text). If they typed something in, the code immediately after the Else line will execute. If they didn’t type in anything (or if they clicked the Cancel button), then the YourName variable will be empty, and the code after the If line will execute instead: Do TryAgain = “No” YourName = InputBox(“Please enter your name:”) If YourName = “” Then MsgBox “You must enter your name to continue.” TryAgain = “Yes” Else Greeting = “Hello, “& YourName & “, great to meet you.” End If If the user didn’t type anything into the input box, you will display a message informing them that they have done something you didn’t want them to. You then set the TryAgain variable (the control variable) to “Yes” and send them around the loop once more and ask the users 15
16. 16. Chapter 1: A Quick Introduction to Programming for their name again (wherein this time they will hopefully type something into the input box). If the user did type in his or her name, then you initialize your familiar Greeting variable. Note that in this case, you do not change the value of the TryAgain variable. This is because there is no need to loop around again because the user has entered a name. The value of TryAgain is already equal to “No”, so there’s no need to change it. 5. In the next line of code, you encounter the end of the loop block. What this Loop line is essen- tially telling the script engine is “If the TryAgain variable equals “Yes” at this point, then go back up to the Do line and execute all that code over again.” If the user entered his or her name, then the TryAgain variable will be equal to “No”. Therefore, the code will not loop again, and will continue onto the last line: Do TryAgain = “No” YourName = InputBox(“Please enter your name:”) If YourName = “” Then MsgBox “You must enter your name to continue.” TryAgain = “Yes” Else Greeting = “Hello, “& YourName & “, great to meet you.” End If Loop While TryAgain = “Yes” MsgBox Greeting MsgBox Greeting If the user did not enter his or her name, then TryAgain would be equal to “Yes”, which would mean that the code would again jump back to the Do line. This is where the reinitialization of the TryAgain variable to “No” is essential because if it wasn’t done then there’s no way for TryAgain to ever equal anything but “Yes”. And if TryAgain always equals “Yes”, then the loop will keep going around and around forever. This results in total disaster for your script, and for the user.Using the For…Next Loop In this kind of loop, you don’t need to worry about infinite loops because the loop is predefined to execute only a certain number of times. Here’s a simple (if not very useful) example. Dim Counter MsgBox “Let’s count to ten. Ready?” For Counter = 1 to 10 MsgBox Counter Next MsgBox “Wasn’t that fun?” This loop is similar to the previous loop. The beginning loop block is defined by the For statement, and the end is defined by the Next statement. This loop is different because you can predetermine how many times it will run; in this case, it will go around exactly ten times. The line For Counter = 1 to 10 essentially tells the script engine, “Execute this block of code as many times as it takes to count from16
17. 17. Chapter 1: A Quick Introduction to Programming1 to 10, and use the Counter variable to keep track of your counting. When you’ve gone through thisloop ten times, stop looping and move on to the next bit of code.”Notice that every time the loop goes around (including the first time through), the Counter variableholds the value of the current count. The first time through, Counter equals 1, the second time throughit equals 2, and so on up to 10. It’s important to note that after the loop is finished, the value of theCounter variable will be 11, one number higher than the highest value in your For statement.The reason for this is that the Counter variable is incremented at the end of the loop, after which theFor statement tests the value of index to see if it is necessary to loop again.Giving you a meaningful example of how to make use of the For...Next loop isn’t easy because youhaven’t been exposed to much VBScript just yet, but here’s an example that shows you don’t need toknow how many times the loop needs to run before you run it. Dim Counter Dim WordLength Dim WordBuilder WordLength = Len(“VBScript is great!”) For Counter = 1 to WordLength MsgBox Mid(“VBScript is great!”, Counter, 1) WordBuilder = WordBuilder & Mid(“VBScript is great!”, Counter, 1) Next MsgBox WordBuilderFor example, the phrase “VBScript is great!” has exactly 18 letter spaces. If you first calculated thenumber of letters in the phrase, you could use that number to drive a For...Next loop. However, thiscode uses the VBScript Len() function to calculate the length of the phrase used. Inside the loop, it usesthe Mid() function to pull one letter out of the phrase one at a time and display them separately. Theposition of that letter is controlled by the counter variable, while the number of letters extracted isdefined by the length argument at the end. It also populates the WordBuilder variable with each loop,adding each new letter to the previous letter or letters, rebuilding the phrase.Here’s a variation of the last example: here giving the user the opportunity to type in a word or phrase to use,proving that there’s nothing up your sleeve when it comes to knowing how many times to loop the code. Dim Counter Dim WordLength Dim InputWord Dim WordBuilder InputWord = InputBox (“Type in a word or phrase to use”) WordLength = Len(InputWord) For Counter = 1 to WordLength MsgBox Mid(InputWord, Counter, 1) WordBuilder = WordBuilder & Mid(InputWord, Counter, 1) Next MsgBox WordBuilder & “ contains “& WordLength & “ characters.” 17
18. 18. Chapter 1: A Quick Introduction to Programming Figure 1-7 shows the final summary message generated by the code. Notice how well the information is integrated. Figure 1-7 Operators and Operator Precedence An operator acts on one or more operands when comparing, assigning, concatenating, calculating, and performing logical operations. Say you want to calculate the difference between two variables X and Y and save the result in variable Z. These variables are the operands and to find the difference you use the subtraction operator like this: Z = X - Y Here you use the assignment operator (=) to assign the difference between X and Y, which was found by using the subtraction operator (-). Operators are one of the single-most important parts of any programming language. Without them, you cannot assign values to variables or perform calculations or comparisons. In fact, you can’t do much at all. There are different types of operators and they each serve a specific purpose, as shown in the following table. Operator Purpose assignment (=) The most obvious and is simply used for assigning a value to a variable or property. arithmetic These are all used to calculate a numeric value, and are normally used in conjunction with the assignment operator and/or one of the comparison operators. concatenation These are used to concatenate (“join together”) two or more different expressions. comparison These are used for comparing variables and expressions against other variables, constants, or expressions. logical These are used for performing logical operations on expressions; all logical operators can also be used as bitwise operators. bitwise These are used for comparing binary values bit by bit; all bitwise operators can also be used as logical operators.18
19. 19. Chapter 1: A Quick Introduction to Programming When you have a situation where more than one operation occurs in an expression, the operations are normally performed from left to right. However, there are several rules. Operators from the arithmetic group are evaluated first, then concatenation, comparison, and finally logical operators. This is the set order in which operations occur (operators in brackets have the same precedence): ❑ ∩, −, (*, /), , Mod, (+, −) ❑ & ❑ =, <>, <, >, <=, >=, Is ❑ Not, And, Or, Xor, Eqv, Imp This order can be overridden by using parentheses. Operations in parentheses are evaluated before operations outside the parentheses, but inside the parentheses, the normal precedence rules still apply. Take a look at the following two statements: A = 5 + 6 * 7 + 8 A = (5 + 6) * (7 + 8) They look the same but they’re not. According to operator precedence, multiplication is performed before addition, so the top line gives A the value 55 (6 * 7 = 42 + 5 + 8 = 55). By adding parenthe- ses, you force the additions to be evaluated first and A becomes equal to 165.Organizing and Reusing Code So far, the scripts you’ve worked with have been fairly simple in structure. The code has been all together in one unit. You haven’t done anything all that complicated, so it’s easy to see all the code in just a few lines. The execution of the code is easy to follow because it starts at the top of the file, with the first line, and then continues downward until it reaches the last line. Sometimes, at certain points, choices redirect the code using branching, or sections of code are repeated using loops. However, when you come to writing a script that actually does something useful, your code is likely to get more complex. As you add more code to the script, it becomes harder to read in one chunk. If you print it on paper, your scripts will undoubtedly stretch across multiple pages. As the code becomes more complex, it’s easier for bugs and errors to creep in, and the poor layout of the code will make these harder to find and fix. The most common technique programmers use to manage complexity is called modularization. This is a big, fancy word, but the concept behind it is really quite simple. This section defines some terminology used when organizing and reusing code, and then discusses how to write your own procedures by turning code into a function. You then learn a few advantages of having procedures. 19
20. 20. Chapter 1: A Quick Introduction to ProgrammingModularization, Black Boxes,Procedures, and Subprocedures Modularization is the process of organizing your code into modules, which you can also think of as build- ing blocks. You can apply the principles of modularity to create your own personal set of programming building blocks, which you can then use to build programs that are more powerful, more reliable, easier to debug, and easier for you and your fellow programmers to maintain and reuse. When you take your code and divide it into modules, your ultimate goal is to create what are known as black boxes. A black box is any kind of device that has a simple, well-defined interface and that performs some discrete, well- defined function. A black box is so called because you don’t need to see what’s going on inside it. All you need to know is what it does, what its inputs are, and (sometimes) what its outputs are. A wristwatch is a good example of a black box. It has inputs (buttons) and outputs (time) and does a simple function well without you worrying about how the innards of the watch work in order to be able to tell the time. The most basic kind of black box programmers use to achieve modularity is the procedure. A procedure is a set of code that (ideally) performs a single function. Good examples of procedures are: ❑ Code that adds two numbers together ❑ Code that processes a string input ❑ Code that handles saving to a file Bad examples include: ❑ Code that takes an input, processes it, and also handles saving to a file ❑ Code that handles file access and database access You’ve been using procedures throughout this chapter, but they have been procedures that VBScript provides for you. Some of these procedures require input, some don’t. Some of these procedures return a value, some don’t. But all of the procedures you’ve used so far (MsgBox(), InputBox(), and so on) are black boxes. They perform one single well-defined function, and they perform it without you having to worry about how they perform their respective functions. In just a moment, you’ll see how to extend the VBScript language by writing your own procedures. Before you begin though, it’s time to get some of the terminology cleared up. Procedure is a generic term that describes either a function or a subprocedure. This chapter touched on some of this confusing termi- nology earlier, but a function is simply a procedure that returns a value. Len() is a function. You pass it some text, and it returns the number of characters in the string (or the number of bytes required to store a variable) back to you. Functions do not always require input, but they often do. A subprocedure is a procedure that does not return a value. You’ve been using MsgBox() as a subproce- dure. You pass it some text, and it displays a message on the screen comprising of that text. It does not return any kind of value to your code. All you need to know is that it did what you asked it to do. Just like functions, procedure may or may not require input.20
21. 21. Chapter 1: A Quick Introduction to ProgrammingTurning Code into a Function Some of the code that follows is from an example you used earlier in the chapter. Here’s how to turn code into a function. Function PromptUserName ‘ This Function prompts the user for his or her name. ‘ If the user enters nothing it returns a zero-length string. ‘ It incorporates various greetings depending on input by the user. Dim YourName Dim Greeting YourName = InputBox(“Hello! What is your name?”) If YourName = “” Then Greeting = “OK. You don’t want to tell me your name.” ElseIf YourName = “abc” Then Greeting = “That’s not a real name.” ElseIf YourName = “xxx” Then Greeting = “That’s not a real name.” Else Greeting = “Hello, “ & YourName & “, great to meet you.” If YourName = “Fred” Then Greeting = Greeting & “ Nice to see you Fred.” End If End If MsgBox Greeting PromptUserName = YourName End Function The first things to take note of in the code are the first and last lines. While not groundbreaking, these are what define a function. The first line defines the beginning of the function and gives it a name while the last line defines the end of the function. Based on the earlier discussion of code blocks, this should be a familiar convention by now. From this, you should begin to realize that a procedure is nothing but a special kind of code block. The code has to tell the script engine where it begins and where it ends. Notice also that you’ve given the function a clear, useful name that precisely describes what this function does. Giving your procedures good names is one of the keys to writing programs that are easy to read and maintain. Notice also how there’s a comment to the beginning of the procedure to describe only what it does, not how the function does what it does. The code that uses this function does not care how the function accomplishes its task; it only cares about inputs, outputs, and predictability. It is vitally important that you add clear, informative comments such as this to the beginning of your procedures, because they make it easy to determine what the function does. The comment also performs one other valuable ser- vice to you and any other developer who wants to call this function — it says that the function may return a zero-length string if the user does not enter his or her name. 21
22. 22. Chapter 1: A Quick Introduction to Programming Finally, notice how, in the second to last line, the function name PromptUserName is treated as if it were a variable. When you use functions (as opposed to subprocedures, which do not return a value), this is how you give the function its return value. In a sense, the function name itself is a variable within the procedure. Here is some code that uses the PromptUserName function. Dim Greeting Dim VisitorName VisitorName = PromptUserName If VisitorName <> “” Then Greeting = “Goodbye, “ & VisitorName & “. Nice to have met you.” Else Greeting = “I’m glad to have met you, but I wish I knew your name.” End If MsgBox Greeting If you are using Windows Script Host for this code, bear in mind that this code and the PromptUserName function itself must be in the same .vbs script file. Dim PartingGreeting Dim VisitorName VisitorName = PromptUserName If VisitorName <> “” Then PartingGreeting = “Goodbye, “ & VisitorName & “. Nice to have met you.” Else PartingGreeting = “I’m glad to have met you, but I wish I knew your name.” End If MsgBox PartingGreeting Function PromptUserName ‘ This Function prompts the user for his or her name. ‘ It incorporates various greetings depending on input by the user. Dim YourName Dim Greeting YourName = InputBox(“Hello! What is your name?”) If YourName = “” Then Greeting = “OK. You don’t want to tell me your name.” ElseIf YourName = “abc” Then Greeting = “That’s not a real name.” ElseIf YourName = “xxx” Then Greeting = “That’s not a real name.”22
23. 23. Chapter 1: A Quick Introduction to Programming Else Greeting = “Hello, “ & YourName & “, great to meet you.” If YourName = “Fred” Then Greeting = Greeting & “ Nice to see you Fred.” End If End If MsgBox Greeting PromptUserName = YourName End Function As you can see, calling the PromptUserName function is pretty straightforward. Once you have written a procedure, calling it is no different than calling a built-in VBScript procedure.Advantages to Using Procedures Procedures afford several key advantages that are beyond the scope of this discussion. However, here are a few of the most important ones: ❑ Code such as that put in the PromptUserName function can be thought of as “generic,” meaning that it can be applied to a variety of uses. Once you have created a discreet, well-defined, generic function such as PromptUserName, you are free to reuse it any time you want to prompt users for their name. Once you’ve written a well-tested procedure, you never have to write that code again. Any time you need it, you just call the procedure. This is known as code reuse. ❑ When you call a procedure to perform a task rather than writing the code in-line, it makes that code much easier to read and maintain. Increasing the readability, and therefore the manageability and maintainability, of your code is a good enough reason to break a block of code out into its own procedure. ❑ When code is isolated into its own procedure, it greatly reduces the effects of changes to that code. This goes back to the idea of the black box. As long as the procedure maintains its predictable inputs and outputs, changes to the code inside of a procedure are insulated from harming the code that calls the procedure. You can make significant changes to the procedure, but as long as the inputs and outputs are predictable and remain unchanged, the code will work just fine.Top-Down versus Event-Driven Before you leave this introduction to programming, it may be helpful to point out that you will encounter two different models of programming in this book: top-down and event-driven programs. The differences between the two have to do with the way you organize your code and how and when that code gets executed at runtime. As you get deeper into programming in general, and VBScript in particular, this will become clearer, so don’t be alarmed if it doesn’t completely sink in right now. 23
24. 24. Chapter 1: A Quick Introduction to ProgrammingUnderstanding Top-Down Programming So far in this chapter you’ve written very simple top-down style programs. The process is simple to follow: ❑ Write some code. ❑ Save the code in a script file. ❑ Use Windows Script Host to execute the script. ❑ The Script Host starts executing at the first line and continues to the last line. ❑ If a script file contains some procedure definitions (such as your PromptUserName function), then the Script Host only executes those procedures if some other code calls them. ❑ Once the Script Host reaches the last line of code, the lifetime of the script ends. Top-down programs are very useful for task-oriented scripts. For example, you might write a script to search your hard drive for all the files with the extension .htm and copy all the names and file locations to a file, formatted in HTML to act as a sitemap. Or you might write a script that gets executed every time Windows starts and which randomly chooses a different desktop wallpaper bitmap file for that session of Windows. Top-down programming is perfect for these kinds of scripts.Understanding Event-Driven Programming Event-driven code is different, and is useful in different contexts. As the name implies, event-driven code only gets executed when a certain event occurs. Until the event occurs, the code won’t get executed. If a given event does not occur during the lifetime of the script, the code associated with that event won’t be executed at all. If an event occurs, and there’s no code associated with that event, then the event is essentially ignored. Event-driven programming is the predominant paradigm in Windows programming. Most of the Windows programs you use every day were written in the event-driven model. This is because of the graphical nature of Windows programs. In a graphical user interface (GUI), you have all sorts of buttons, drop-down lists, fields in which to type text, and so on. For example, the word processor program Microsoft Word is totally jam-packed with these. Every time a user clicks a button, chooses an item in a list, or types some text into a field, an event is “raised” within the code. The person who wrote the pro- gram may or may not have decided to write code in response to that event. However, if the program is well written, an item such as a button for saving a file, which the user expects to have code behind it, will indeed have code behind it.How Top-Down and Event-Driven Work Together When a GUI-based program starts, there is almost always some top-down style code that executes first. This code might be used to read a setting stored in the registry, prompt the user for a name and pass- word, load a particular file at startup or prompt to take the user through setup if this is the first time the application has been run, and so on. Then a form typically comes up. The form contains all the menus, buttons, lists, and fields that make up the user interface of the program. At that point, the top-down style coding is done, and the program enters what is known as a wait state. No code is executing at this point and the program just waits for the user to do something. From here on, it’s pretty much all about events.24
25. 25. Chapter 1: A Quick Introduction to Programming When the user begins to do something, the program comes to life again. Suppose the user clicks a but- ton. The program raises the Click event for the button that the user clicked. The code attached to that event starts to execute, performs some operations, and when it’s finished, the program returns to its wait state. As far as VBScript is concerned, the event-driven model is used heavily in scripting for the Web. Scripts that run inside of HTML web pages are all based on events. One script may execute when the page is loaded, while another script might execute when the user clicks a link or graphic. These “mini scripts” are embedded in the HTML file, and are blocked out in a syntax very similar to the one you used to define the PromptUserName function in the previous section.An Event-Driven Code Example As you progress through the second half of this book, the finer points of event-driven programming will become much clearer to you. However, just so you can see an example at this point, type the following code into your text editor, save the file with a .HTM extension, and then load it into Internet Explorer 6 (if you are running Internet Explorer 6/7 and you are running this file off your desktop, you might have to dismiss some security warnings and allow ActiveX). <html> <head> <title>Simple VBScript Example</title> <script language=”vbscript”> Sub ButtonClicked window.alert(“You clicked on the button!”) End Sub </script> </head> <body> <button name=”Button1” type=”BUTTON” onclick=”ButtonClicked”> Click Me If You Can!!! </button> </body> </html> Figure 1-8 shows the result of clicking the button on the page. In this case it’s only a message box but it could be much more.Coding Guidelines It’s a really good idea to get into healthy programming habits right from the beginning. As you continue to hone your programming skills and possibly learn multiple languages, these habits will serve you well. Your programs will be easier for you and your fellow developers to read, understand, and modify, and they will also contain fewer bugs. When you first start writing code, you have to concentrate so hard on just getting the syntax correct for the computer that it may be easy for you to forget about all the things you need to do in order to make sure your code is human friendly as well. However, attentiveness early on will pay huge dividends in the long run. 25
26. 26. Chapter 1: A Quick Introduction to Programming Figure 1-8Expect the Unexpected Always remember that anything that can happen probably will happen. The idea here is to code defensively — preparing for the unexpected. You don’t need to become totally fixated on preparing for all contingencies and remote possibilities, but you can’t ignore them either. You especially have to worry about the unexpected when receiving input from the user, from a database, or from a file. Whenever you’re about to perform an action on something, ask yourself questions such as: ❑ What could go wrong here? ❑ What happens if the file is flagged read-only? ❑ What happens if the file isn’t there? ❑ What happens if the user doesn’t run the program from the right folder? ❑ What happens if the database table doesn’t have any records? ❑ What happens if the registry keys I was expecting aren’t there? ❑ What happens if the user doesn’t have the proper permission to carry out the operation? If you don’t know what might go wrong with a given operation, find out through research or trial and error. Get others to try out your code and get their feedback on how it worked for them, on their system configuration, and on their operating system. Don’t leave it up to your users to discover how well (or not) your script reacts to something unexpected. A huge part of properly preparing for the unexpected is the implementation of proper error handling, which is discussed in detail in Chapter 6.26
27. 27. Chapter 1: A Quick Introduction to ProgrammingAlways Favor the Explicit over the Implicit When you are writing code, constantly ask yourself: Is my intent clear to someone reading this code? Does the code speak for itself? Is there anything mysterious here? Are there any hidden meanings? Are the variable names too similar to be confusing? Even though something is obvious in your mind at the moment you are typing the code, it doesn’t mean it will be obvious to you six months or a year from now — or to someone else tomorrow. Always endeavor to make your code as self-documenting as possi- ble, and where you fall short of that goal (which even the best programmers do — self-documenting code can be an elusive goal), use good comments to make things clearer. Be wary of using too many generics in code, such as x, y, and z as variable names and Function1, Function2, and Function3 as function names. Instead, make them explicit. Use variable names such as UserName and TaxRate. When naming a variable, use a name that will make it clear what that variable is used for. Be careful using abbreviations. Don’t make variable names too short, but don’t make them too long either (10–16 characters is a good length, but ideal length is largely a matter of preference). Even though VBScript is not case-sensitive, use mixed case to make it easier to distinguish multiple words within the variable name (for example, UserName is easier to read than username). When naming procedures, try to choose a name that describes exactly what the procedure does. If the procedure is a function that returns a value, indicate what the return value is in the function name (for example, PromptUserName). Try to use good verb–noun combinations to describe first, what action the procedure performs, and second, what the action is performed on (for example, SearchFolders, MakeUniqueRegistryKey, or LoadSettings). Good procedure names tend to be longer than good variable names. Don’t go out of your way to make them longer, but don’t be afraid to either. Fifteen to thirty characters for a procedure name is perfectly acceptable (they can be a bit longer because you generally don’t type them nearly as much). If you are having trouble giving your procedure a good name, that might be an indication that the procedure is not narrow enough — a good procedure does one thing, and does it well. That said, if you are writing scripts for web pages to be downloaded to a user’s browser, it is sometimes necessary to use shorter variable and procedure names. Longer names mean larger files to download. Even if you sacrifice some readability to make the file smaller, you can still take time to create descriptive names. With web scripts, however, you may encounter instances where you don’t want the code to be clear and easy to understand (at least for others). You’ll look at techniques that you can employ to make scripts harder for “script snoopers” to follow while still allowing you to work with them and modify them later (see Chapter 17).Modularize Your Code into Procedures,Modules, Classes, and Components As you write code, you should constantly evaluate whether any given code block would be better if you moved it to its own function or subprocedure: ❑ Is the code rather complex? If so, break it into procedures. ❑ Are you using many Ands and Ors in an If...End If statement? Consider moving the evaluation to its own procedure. 27
28. 28. Chapter 1: A Quick Introduction to Programming ❑ Are you writing a block of code that you think you might need again in some other part of the script, or in another script? Move it to its own procedure. ❑ Are you writing some code that you think someone else might find useful? Move it. This isn’t a science and there are no hard and fast rules for code — after all, only you know what you want it to do. Only you know if parts are going to be reused later. Only you know how complex something will turn out. However, always keep an eye out for possible modularization.Use the “Hungarian” Variable Naming Convention You might hear programmers (especially C++ programmers) mention this quite a bit. While this is a bit out of scope of this introductory discussion, it is still worth mentioning nonetheless. The Hungarian naming convention involves giving variable names a prefix that indicates what the scope and data type of the variable are intended to be. So as not to confuse matters, the Hungarian convention was not used in this chapter, but you will find that most programmers prefer this convention. Properly used, it makes your programs much clearer and easier to write and read. See Chapter 3 for more on Hungarian notation variable prefixes. The standard prefixes for scope and data types are in Appendix B.Don’t Use One Variable for More Than One Job This is a big no-no and a common mistake of both beginner and experienced programmers alike (but the fact that experienced programmers might have a bad habit does not make it any less bad). Each variable in your script should have just one purpose. It might be very tempting to just declare a bunch of generic variables with fuzzy names at the beginning of your script, and then use them for multiple purposes throughout your script — but don’t do it. This is one of the best ways to introduce very strange, hard to track down bugs into your scripts. Giving a vari- able a good name that clearly defines its purpose will help prevent you from using it for multiple pur- poses. The moral here is that while reusing variables might seem like a total timesaver, it isn’t and can lead to hours of frustration and wasted time looking for the problem.Always Lay Out Your Code Properly Always remember that good code layout adds greatly to readability later. Don’t be tempted to save time early on by writing messy, hard to follow code because as sure as day turns to night, you will suffer if you do. Without reading a single word, you should be able to look at the indentations of the lines to see which ones are subordinate to others. Keep related code together by keeping them on consecutive lines. Also, don’t be frightened of white space in your code. Separate blocks of unrelated code by putting a blank line between them. Even though the script engine will let you, avoid putting multiple statements on the same line. Also, remember to use the line continuation character (_) to break long lines into multiple shorter lines. The importance of a clean layout that visually suggests the logic of the underlying code cannot be overemphasized.28
29. 29. Chapter 1: A Quick Introduction to ProgrammingUse Comments to Make Your Code More Clearand Readable, but Don’t Overuse Them When writing code, strive to make it as self-documenting as possible. You can do this by following the guidelines set out earlier. However, self-documenting code is hard to achieve and no one is capable of 100% self-documenting code. Everyone writes code that can benefit from a few little scribbles to serve as reminders in the margins. The coding equivalents of these scribbles are comments. But how can you tell a good comment from a bad comment? Generally speaking, a good comment operates at the level of intent. A good comment answers the questions: ❑ Where does this code block fit in with the overall script? ❑ Why did the programmer write this code? The answers to these questions fill in the blanks that can never be filled by even the best, most pedantic self-documenting code. Good comments are also generally “paragraph-level” comments. Your code should be clear enough that you do not need a comment for each and every line of code it contains, but a comment that quickly and clearly describes the purpose for a block of code allows a reader to scan through the comments rather than reading every line of code. The idea is to keep the person who might be reading your code from having to pore over every line to try and figure out why the code exists. Commenting every line (as you probably noticed with the earlier examples) makes the code hard to follow and breaks up the flow too much. Bad comments are generally redundant comments, meaning they repeat what the code itself already tells you. Try to make your code as clear as possible so that you don’t need to repeat yourself with comments. Redundant comments tend to add clutter and do more harm than good. Reading the code tells you the how; reading the comments should tell you the why. Finally, it’s a good idea to get into the habit of adding “tombstone” or “flower box” comments at the top of each script file, module, class, and procedure. These comments typically describe the purpose of the code, the date it was written, the original author, and a log of modifications. ‘ Kathie Kingsley-Hughes ‘ 22 Feb 2007 ‘ This script prompts the user for his or her name. ‘ It incorporates various greetings depending on input by the user. ‘ ‘ Added alternative greeting ‘ Changed variable names to make them more readableSummar y In this chapter you took a really fast-paced journey through the basics of programming. The authors tried to distill a whole subject (at least a book) into one chapter. You covered an awful lot of ground but also skimmed over or totally passed by a lot of stuff. However, the information in this chapter gave you the basics you need to get started programming with VBScript and the knowledge and confidence you need to talk about programming with other programmers in a language they understand. 29
30. 30. What Are VBScript Data Types? VBScript has only one data type called a Variant. A Variant is a special kind of data type that can containdifferent kinds of information, depending on how its used. Because Variant is the only data type in VBScript,its also the data type returned by all functions in VBScript. At its simplest, a Variant can contain either numeric or string information. A Variant behaves as a numberwhen you use it in a numeric context and as a string when you use it in a string context. That is, if youreworking with data that looks like numbers, VBScript assumes that it is numbers and does the thing that is mostappropriate for numbers. Similarly, if youre working with data that can only be string data, VBScript treats itas string data. Of course, you can always make numbers behave as strings by enclosing them in quotationmarks (" ").Variant Subtypes Beyond the simple numeric or string classifications, a Variant can make further distinctions about thespecific nature of numeric information. For example, you can have numeric information that represents a dateor a time. When used with other date or time data, the result is always expressed as a date or a time. Ofcourse, you can also have a rich variety of numeric information ranging in size from Boolean values to hugefloating-point numbers. These different categories of information that can be contained in a Variant are calledsubtypes. Most of the time, you can just put the kind of data you want in a Variant, and the Variant behaves ina way that is most appropriate for the data it contains. The following table shows the subtypes of data that a Variant can contain. Subtype Description Empty Variant is uninitialized. Value is 0 for numeric variables or a zero-length string ("") for stringvariables. Null Variant intentionally contains no valid data. Boolean Contains either True or False. Byte Contains integer in the range 0 to 255. Integer Contains integer in the range -32,768 to 32,767. Currency -922,337,203,685,477.5808 to 922,337,203,685,477.5807. Long Contains integer in the range -2,147,483,648 to 2,147,483,647. Single Contains a single-precision, floating-point number in the range -3.402823E38 to-1.401298E-45 for negative values; 1.401298E-45 to 3.402823E38 for positive values. Double Contains a double-precision, floating-point number in the range -1.79769313486232E308 to-4.94065645841247E-324 for negative values; 4.94065645841247E-324 to 1.79769313486232E308 forpositive values. Date (Time) Contains a number that represents a date between January 1, 100 to December 31, 9999. String Contains a variable-length string that can be up to approximately 2 billion characters in length. Object Contains an object. Error Contains an error number. You can use conversion functions to convert data from one subtype to another. In addition, the VarTypefunction returns information about how your data is stored within a Variant.© 1997 Microsoft Corporation. All rights reserved. Terms of Use.
|
__label__1
| 0.509907
|
Early experiences matter: Lasting effect of concentrated disadvantage on children's language and cognitive outcomes
ArticleinHealth & Place 16(2):371-80 · November 2009with31 Reads
Impact Factor: 2.81 · DOI: 10.1016/j.healthplace.2009.11.009 · Source: PubMed
A small but provocative literature suggests that neighbourhood socioeconomic conditions experienced by children early in life influence a variety of health and developmental outcomes later in life. We contribute to this literature by testing the degree to which neighbourhood socioeconomic conditions that children experience in Kindergarten influence their later language and cognitive outcomes in early adolescence, over and above current neighbourhood context and various child-level covariates including scores on a Kindergarten measure of school readiness. Cross-classified random effects modelling (CCREM) analyses were performed on a study population of 2648 urban children residing throughout the province of British Columbia, Canada, who were followed longitudinally from Kindergarten (age 5/6) to Grade 7 (age 12/13). Findings demonstrate that neighbourhood concentrated disadvantage experienced during Kindergarten has a durable, negative effect on children's reading comprehension outcomes seven years later-providing evidence that early social contextual experiences play a critical role in the lives of children. Possible explanations and future directions are discussed.
|
__label__1
| 0.999454
|
P. 1
The Marxist-Leninist Publishing Field in Greece during the 60s-70sChristos Mais - MA Thesis
|Views: 10|Likes:
Published by ipoulos69
MA Thesis for the MA Book & Digital Media, University of Leiden
More info:
Categories:Types, Research
Published by: ipoulos69 on Mar 31, 2013
Copyright:Attribution Non-commercial
Read on Scribd mobile: iPhone, iPad and Android.
download as PDF, TXT or read online from Scribd
See more
See less
• 1. Prologue
• 2. Methodology
• 3. Publishing activity and the movement of ideas in Greece in the 60s-70s3
• 3.1 Political situation in Greece during the 60s-70s
• 3.2 Publishing and Ideology
• 4. Determining what is Marxist-Leninist publishing
• 4.1 External Forces
• 4.1.1 The role of China
• Chinese Publications for international use
• Distribution
• Chinese policies
• The Decline
• Synopsis
• The role of Albanian publications
• 5. Greek Marxist-Leninist publications
• 5.1 Greek Civil War (1946-49)
• 5.2 Publications in Exile (1949 – 64)29
• 5.3 M-L publications turning into revisionist
• 7. M-L publishing in Greece
• 7.1 The League of Friends of “New China”
• 7.2 The first Greek M-L Publishing House
• 7.2.1 Censorship and “Censorship”
• 7.2.3 How to advance
• 7.2.4 Non-professionals as agents of the field
• 7.2.5 Financial Independence of the Marxist-Leninist Publishing Field
• 7.3 M-L publications during the Junta
The Marxist-Leninist publishing field during the 60s-70s in Greece
Christos Mais (s0818178) Publishing Studies Book & Digital Media Studies 2008-2009 Supervisor: Prof.dr. A.H. v.d. Weel Second Reader: Prof.dr. P.W.M. Rutten 10 August 2009 Leiden University
Table of Contents
1. 2. 3. 3.1 3.2 4. 4.1 4.1.1
Prologue Methodology Publishing Activity and the movement of ideas in Greece in the 60s-70s Political situation in Greece during the 60s-70s Publishing and Ideology Defining what is Marxist-Leninist Publishing External Forces The role of China
5 7 8 8 9 10 14 14 15 17 19 19 20 20 22 22 25 28 28 30 37 39 40 41 42 47 49 51 52 54 55 2 Chinese Publications for international use Distribution Chinese policies The Decline Synopsis The role of Albanian publications 5. 5.1. 5.2 5.3 5.3.1 6. 6.1 7. 7.1 7.2 Greek Marxist-Leninist Publications The Greek Civil War (1946-49) Publications in Exile (1949-64) M-L publications turning revisionist Exiled and Censored Publishing among Greek Marxists-Leninists Political Refugees Relations with Greeks m-l abroad M-L publishing in Greece The League of Friends of “New China” The first Greek M-L Publishing House
7.1.1 How to know China better 7.2.1 Censorship and “Censorship” 7.2.2 EDA youth and Anagennisi 7.2.3 How to advance 7.2.4 Non-professionals as agents of the field 7.2.5 Financial Independence of the Marxist-Leninist Press 7.3 M-L Publications during the Junta
7.3.1 7.3.2 7.3.4 8. 9. 9.1. 9.2. 9.3
M-L publishing in Greece during the Junta M-L publishing abroad From Metapolitefsi to Social-democracy Epilogue Bibliography Archival material Books and articles Websites
55 56 58 61 62 62 62 65
I would also like to thank S. Iordanides. Samaras for their time and all the useful information they have provided. the monthly political review Anagennisi. for providing me access to their archives as well as the people of the International Institute of Social History in Amsterdam and of the Archives of Contemporary Social History in Athens for their help*. Agoutoglou. Special thanks to the Communist Party of Greece (marxist-leninist). G. C. P. Papaioannou and V. Koufovasilis. the Marxist-Leninist Communist Party of Greece and the Revolutionary Communist Movement of Greece. ∗ 4 . Mpistis. is pictured on the cover. C. Constantopoulos.Acknowledgements I would like to thank my professors of the MA Book & Digital Media Studies for the insight they have provided throughout the year as far as publishing is concerned. I. The cover of the first issue of the first Marxist-Leninist periodical.
5 1 . It did not even become an independent publishing field after 1956 and the change of politics within the Communist Party of the Soviet D. on a global scale. the aspect of social and political conditions is often neglected. McCleery. (Routledge: New York. So publishing Mao’s Five Essays on Philosophy could mean a possible business failure in a country of Western Europe but on the contrary could bring a substantial profit in a country of Latin America or Asia. The Marxist-Leninist publishing field did not appear as an independent publishing field until the early 60s. 2. An introduction to book history. Even if the truth is somewhere in between.Books are important vehicles of ideas that often challenge established norms and authorities. 2005). It may as well give useful insight for the present and the future. one must question if that is the driving force as far as the evolution of publishing is concerned? Are the changes (to come) in the industry a direct result of technological changes or do the social conditions play the key role? The use of such a scope is important not only for social scientists but also for book studies as well. Although nobody can deny the importance of technological advancements.1 1. Prologue Looking back upon fields of the publishing industry doesn’t necessarily have to deal with just book history or nostalgia for the past. Finkelstein – A. Political currents have often been taken as a unity with exactly the same characteristics worldwide. This is due to the fact that the main trend in the International Communist Movement after the October Revolution 1917 in Russia onwards was Marxism-Leninism. That is not quite true. p. An attempt to give an outline of what were the dynamics that gave birth to leftist publishing fields and especially the MarxistLeninist (M-L) in Greece during the 60s-70s will be made in the pages to follow. This has to do with the different history of the MarxistLeninist or Maoist movement in the Western world and in the so-called Third world countries. Political trends and the publishing trends respectively that have in a way been marginalized in relation to their status 30 or 60 years ago. are still popular in certain regions.
This was despite the fact some communist parties. It is no coincidence that the course of the Greek and International Marxist-Leninist movement was parallel to the one of the Greek Marxist-Leninist publishing field and for that reason both gradually faded out during the early 80s. For this reason it is important to follow the parallel and for a long time independent course of the publishing activity of the Greek political refugees Marxist-Leninist movement. 6 . Also both the M-L movement and the M-L publishing field shared characteristics such as financial autonomy from the State and other institutions. Not all Greek communists were concentrated within Greece during the period 1949 (end of the Greek Civil War) and until 1974 (fall of the Junta). or factions within other parties disagreed with this change. These two movements underwent into a process of unification during the Junta and were unified (in geographical terms) after the fall of the Junta when the political refugees were allowed to return. So the Greek Marxist-Leninist Publishing field in the 60s-70s cannot be analyzed exclusively within the scope of the social and political conditions of Greece alone. In order to by analysed in a sufficient manner it must take into consideration what took place in an international level and mainly in China during the same period. In Chapter 5. Also a hierarchy of aims and goals where ideology and politics come first and financial issues such as making profit was irrelevant or was just seen as an opportunity for having more resources to use in order to promote ideological and political issues. which was considered as the leading force within the International Communist Movement. This role is examined in Chapter 4. which is examined in Chapter 6. Then and since I consider that Chinese (and Albanian) foreign policy determined in a great extent the course of the Marxist-Leninist movement on a global scale as the external force (key factor) of the creation. I analyse the prehistory of M-L publications in Greece. I will sketch politics and ideology within the Greek society during the 60s-70s in relation to the publishing industry of that period. development and disintegration of the Greek Marxist-Leninist publishing field. and so did their publishing activity. It was not until 1963 when China openly called for Marxists-Leninists to fight against what is presently known as Soviet Revisionism that we have the establishment of the Marxist-Leninist movement and thus of the Marxist-Leninist publishing field.Union. and that of the Marxist-Leninist movement within Greece which is examined in Chapter 7. First.
Some specific characteristics of the M-L publishing field which differentiates it from other publishing fields such as the fact that the agents within this field were non-professionals driven by ideology and politics and not from profit something that goes for the M-L publishing field as a whole is examined in section 7.2.4. Sections 7.2.5 refers to the principle of financial autonomy, which is another important aspect of this field. Of course and due to the international developments mentioned before from the Junta onwards we have other splits within the M-L movement and the M-L publishing field, which are examined, in section 7.3. 2. Methodology When examining a political publishing field you have a juncture of the ideological, political and social sphere that is immanent in all trends of politics and of course of the publishing field. In this MA Thesis Ι used Pierre Bourdieu’s theory of the literary field combined with Oral history. David Finkelstein and Alistair McCleery’s words in their book An Introduction to Book History on Bourdieu are characteristic on why his theory fits in this MA Thesis:2 His articulation of the ‘literary field’ has proven fruitful for those concerned particularly with contemporary (nineteenth- to twenty-first-century) print culture and authorship. Bourdieu’s ‘literary field’ stresses the juncture between culture, society, and material production, and is defined as common social, intellectual, and ideological arenas linking producers (publishers, editors and authors) to products (books, periodical publications, literary works). Researching about the Greek Marxist-Leninist publishing and the Greek Marxist-Leninist movement in total is more of a trip to the unknown. So the use of oral history was done mainly in order to cover the gaps. The less than a handful of researches of the m-l movement note that Greek Marxist-Leninist history is
A., McCleery, D. Finkelstein, An introduction to book history, (New York: Routledge 2005), p. 22. 7
practically unknown and indistinct. Furthermore and apart from the lack of primary sources of important periods of this movement, the lack of secondary sources and the often contradictory information within these few sources are also obstacles to overcome. The use of oral history aimed at overtaking or at least bypassing some of these obstacles. Its use was successful as far as enlightening some unknown details of M-L publishing was concerned. 3. Publishing activity and the movement of ideas in Greece in the 60s-70s3 The decades of the 60s-70s had it all. From anti-communism and censorship, to the political instability that led to the Junta, the advancement of the leftist movement and publishing these decades were full of developments in many levels (e.g. social, cultural, political). This constant tension led to political developments within the left movement – such as the birth of the m-l movement - which needed nurturing. And publications were the nourishment. 3.1 Political situation in Greece during the 60s-70s The 60s were a decade where the whole world was in a constant turmoil. National Liberation Struggles in Africa and Asia, the Vietnam war, Coup d’états like in Congo and Ethiopia, student mobilizations all over the world. In Greece the political situation was unstable with labor and popular mobilizations becoming more and more intense despite the police brutality and murders of progressives like the student Sotiris Petroulas who was murdered in 1965 during Iouliana, when people mobilized against the King’s imposition on the elected government and the murder of the Member of Parliament Grigoris Labrakis. The inner-imperialist contradictions and rivalry between Great Britain and the United States played a key role to the developments in Greece. Since the end of WWII the British lost their influence, and from then onwards Greece became a protectorate of the United States. Britain though didn’t give up and was trying to regain its influence. At the same time the United States attempted to use Greece in
The title is borrowed from Axelos L., Publishing Activity and the Movement of Ideas in Greece. 2nd Ed., Stochastis, Athens 2008. 8
order to install NATO (U.S.) military bases in Cyprus. This had to be done in order to help them control the Arab peninsula. These were the reasons that led to the USbacked Junta of the Colonels (1967-1974). During the Junta and especially after the first two or three years – in the early 70s – there had been a reorganization of the popular movement. Mainly the students have made attempts for student unionism independent from the regime that gradually led into political struggle against the regime. Also abroad, mainly in Western Europe, Greek students, immigrants and progressives in exile organized anti-Junta organizations. The students struggle led to the uprising and occupation of Polytechneio (The Polytechnical institute in Athens) in 1973, which until today is a symbol of the students and people struggle against the US-backed Junta. After the end of the Junta and after seven years of oppression came the disappointment and frustration of mainly the youth of Greece. The reason was that the social and political change for which they fought during the Junta never came since the right-wing political party that had very close ties with the Junta came to power. So the student and labor movement were in a constant alert demonstrating, going on strike etc. This came to an end during the early 80s and the rise of PASOK (Pan-Hellenic Socialist Movement), a social democrat party that adopted the slogans and phraseology of the left in order to gain power. Even today some political scientists, activists or left political groups insist that in the first years it was a left party that turned bourgeois after a period of time. But this approach is far from the truth, is more an attempt to either cover their own illusions at the time instead of really looking into the real issues that the Left was unaable to address at the time and led to PASOK’s victory and the loss of the Left (in general). Finally, it gained control of the Labor and Student Unions and in October 1981 it won the National Elections. The Left underwent an existential crisis due to PASOK. Many groups dismantled and their rank and files joined PASOK. Even those that due to their more solid ideological and political basis managed not to be absorbed by this new rising force of the Greek political scene lost lots of their cadres and members. This disintegration of the Left started taking place during the late 70s and was completed a few years later, in the mid-80s. 3.2 Publishing and Ideology 9
The production of magazines and periodicals as well as books and pamphlets increased substantially in order to serve the needs of the ongoing debates and struggles of the era. This increasing production led to the development of distribution channels that often differed from the mainstream ones such as going to mainstream bookstores. Parties created after Mao’s appeal in 1963 in order to differentiate from revisionist parties that misappropriated the title Communist Party used M-L as well. That is the movement that was formulated after the call of Mao Zedong in 1963 for the creation of m-l parties. the anti-Junta struggle and the debates that followed during the Metapolitefsi . in our case printed in order to feed an audience. So in order to proceed. That meant hand to hand distribution from political organizations – that were the publishers – members to their followers. distribution through political parties and organizations offices. it must be made clear what is considered as m-l publications. We can schematically say that the two sides that mainly took place in the split are: 10 . Italy kept the title Communist Party of Italy so the genuine communists – Marxists-Leninists – established an m-l party.The national and international developments. etc. So the revisionists in. Marxists-Leninists consider themselves as the genuine continuators of the course of the International Communist Movement from Marx and Engels until Lenin and Stalin. 4. Μ-L publications are considered the publications produced by the Marxist-Leninist movement.as the years that followed the fall of the Junta (from 1974 onwards) are called – led to respective developments in the publishing industry. In general the m-l movement was created in the mid 60s after a split within the international communist movement took place. The demand of material. establishment of political bookstores. A course that in an international level had been continued by Mao Zedong and the Peoples’ Republic of China until 1976. lets say. Determining what is Marxist-Leninist publishing Various ideological currents within the communist movement often use MarxismLeninism as a denominator. that had an urge for politics. This is the reason that it is widely known as Maoist rather than m-l. the Communist Party of Italy (marxist-leninist). mainly university students.
changing the fundamental basis of that theory is to nullify it in place of a new one.national or/and international . The leading forces within the m-l movement have been the Communist Party of China led by Mao Zedong (that’s why the split is usually mentioned as SinoSoviet) and the Party of Labour of Albania led by Emver Hoxha. 2) Are translations of works from China and Albania – the two main forces conducting antirevisionist struggle in the 60s . There have been two major splits within the M-L movement as well.issues of m-l groups and parties.as well as translations of publications by m-l parties from Europe and the World. 11 4 . These conflicts within the m-l movement during the late 70s among other factors led to the disintegration of the movement by the early 80s.org/glossary/frame.R. Revisionism is the deviation of Marxism-Leninism. essentially usurping (though taking elements of) the former theory and replacing it with a new one.P. Revisionism is the fundamental alteration of a theory. The term revisionism was used first against the German Social Democrat Edward Bernstein (1850-1932) and later on by the m-l movement against Nikita Khrushchev and the Soviet Union. These conflicts can be easily noticed in the m-l publications. Publications that: 1) Denounce Soviet Revisionism (the political turn initiated by the 20th Congress of the Communist Party of the Soviet Union.C. in 1976 after the death of Mao and the rise of Deng Xiao-Ping in China and the second after Hoxha’s criticism of Mao and the Great Proletarian Cultural Revolution (G. 3) Are original publications on ideological. either in the form of polemics or by the fact that some publishing houses stopped translations of Chinese or Albanian works or both. February 1956) and revisionism in general. 2) Those that rejected soviet politics and created what is known as the m-l movement.) in 1978.1) Those forces that aligned with the Soviet politics (also known as Revisionism4 or Soviet Social-imperialism). While the attributes of a theory are subject to change in accordance to changing historic circumstances. <http://www. Firstly. Publications that meet at least the first term and/or the other terms mentioned below can be considered as m-l publications. political or cultural .htm> (03/08/2009).marxists.
China and/or Albania). Bookstores played a significant role for the m-l movement as a whole for several reasons. In cases of countries like Greece. On the 9th of September 1955 in Tashkent (Uzbekistan) where the majority (more than 7000) of the Greek Communist Party members lived . The distinctiveness of the Greek case was that the whole development of the anti-revisionist or m-l movement was initiated much earlier than the rest of the world. Bookstores that mainly if not exclusively sold m-l publications were often set up in most of the countries the m-l movement was present. workers and intellectuals. such as: 1) 2) 3) These bookstores have been the main distribution channel of original publications. They served as a meeting and discussion point for leftist students.This was not a Greek phenomenon. bookstores and periodicals established all over the world in a similar manner selling material as described above. periodicals and pamphlets. where the anti-revisionist struggle was launched in 1963. The distribution of publications of other m-l groups/parties/organizations and mainly publications of Foreign Languages Press of Peking was in some cases more essential for many groups since the publications were provided in their language on the first place. organizations and parties produced newspapers. Bookstores were a significant part of the leftist political/public sphere. All over the world m-l groups. Serving as a distribution channel and a source for international publications that gave an insight on the international developments of the m-l movement. It all started after the intervention of the Soviets in the internal affairs of the Communist Party of Greece (CPG) of whom the vast majority was in exile after the defeat of the guerillas in 1949. translations and original publications had to be made as well and played a key role in these countries where the local needs could not be covered just by distributing the material imported from abroad (e.g. due to the fact we have a language limited within the boundaries of a single country. Nevertheless these groups still produced newspapers and periodicals along with pamphlets mainly concerning analysis on the internal situation and their stand on various issues. It was part of the publishing sector of the m-l groups and the people working in the bookstores were party members.after the defeat of the guerillas from the US and Greek National 12 . There have been publishing houses.
About a year later the minority expelled the majority (around 85% of the party members that continued being loyal to the m-l principles) again under the guidance of the Soviet revisionists. from 1956 until 1962 took place in the Greek island of Ai Stratis where the vast majority of the communist political prisoners had been exiled.the Greek revisionists tried to take over the party offices with the cover of the soviets. after 1963 Mao Zedong’s appeal for creation of m-l groups all over the world.Army in 1949 . M-L publishing followed a parallel course with the m-l movement in general. which accepted the changes in the Soviet Union in practice. EDA. but didn’t see a militant stance from their leadership. The field faced a crisis together with the m-l movement and the disintegration of the m-l 13 . prior to the open revisionist turn of the Soviet Union in 1956. These were mainly either former exile of Ai Stratis that denounced these politics but also students. A core of these dissentients (a group led by Yiannis Hontzeas and Isaac Iordanides) made the first publishing attempts of m-l publications and founded the first m-l publishing house Istorikes Ekdoseis and the monthly political review. The pacifist approach and the loss of autonomy of EDA to the Enosis Kentrou made a lot of its members skeptical on the future of EDA. which was antidemocratic (a coup d’état by the Soviets and their people within the Communist Party of Greece) and a local attempt to implement the change of political line of the Soviet Union. the leadership of the legal political formation of the left in Greece. The reason was the denouncement of the 6th plenum of the Central Committee of the CPG. This was caused by internal (Greek) factors although it really became clear to the Greek Communist Movement ten years later. Despite the various attempts to persuade the communists in exile to accept the new political line (revisionism) the vast majority stayed loyal to the m-l principles. So the dynamics created by the external forces mentioned above led to the creation of a temporary publishing field (roughly from the early ‘60s until the early ‘80s). Besides the above. So the ground from which m-l publishing originates had already been created in 1955. Anagennisi. which were the most militant part of society at the time. A similar political struggle that lasted for 6 years. and thus the antirevisionist struggle expanded on a global scale. followed a policy of unconditional support of the moderate party Enosis Kentrou (Union of Centre).
Spanish. mainly through their publication Peking Review.1 The role of China The Communist Party of China played a great role and contributed towards the direction of the anti-revisionist (m-l) struggle.movement led to the disintegration of the publishing field. They provided ideological and political support through their foreign publications. the political line of the Chinese Communist Party changed from revolutionary to revisionist. German. after the death of Mao Zedong. the Chinese Communist Party and the People’s Republic of China (PRC) tried to fulfil three objectives by the use of periodicals and publishing houses aiming at an international audience: 1. That had as Interview with Grigoris Constantopoulos is a member of the Central Organ of the Communist Party of Greece (marxist-leninist) (KKE(m-l)) and the publisher of its biweekly newspaper Proletariake Simea on the 17 January 2009. since the dynamics created by the antirevisionist and revolutionary struggle weakened substantially. 4. Italian. etc in order to be accessible (readable or easier to translate to native languages) all over the world. economic and cultural system. pamphlets and periodicals were published in China in English. 14 5 . More specifically.R. 2. During the ‘60s-‘70s national liberation struggles had been progressing in the aforementioned regions and the Chinese wanted to promote them. Books. b) To promote the anti-revisionist struggle of the G. (1966-1969).P. Africa and Latin America). political. 4. This was done mainly by ideological support through publications. 5 At the end of the 1970s. 3.C. To promote the Chinese social.1. French.1 External Forces Chinese and Albanian politics aided by their publications played a very significant role in the formation of the m-l movement and thus m-l publications. To expose the conditions in the third world (Asia. a) To promote the revolutionary line in opposition to the revisionist line (Soviet Union) from 1963 onwards.
abroad.cn/en/newsdetail. The titles were usually exported worldwide by Chinese immigrants or publishing houses that were set up for this purposes and where distributed mainly by the m-l organizations in each country and their bookstores where available.R. Second Edition. So the necessity for these publications started fading out. 7 6 15 . the Red Flag8 (Hongqi) which had been the major theoretical publication of the Central Committee of the CCP founded as a monthly publication in 1958 until 1979 when it became bi-monthly until 1988 when it was terminated and the Liberation Army Daily. FLP reproduced articles from the People’s Daily7 (Renmin Ribao) the organ of the Central Committee of the Chinese Communist (CCP).1 Chinese Publications for international use Articles copied and translated from Chinese publications played an essential role in m-l publication in Greece (and elsewhere).com. pp 420421. It produced both literary and political works in many languages.1. during the ‘60s-‘70s were either by FLP. (Scarecrow Press: Plymouth 2007)..flp. L. Sullivan. newspaper of the People’s Liberation Army (PLA). < http://www. distributed worldwide or publications translated from FLP publications in cases like Greece where no Greek-language publications were provided by FLP. Chinese publications played a very important role both to help solving and philosophical and ideological issues that some falsely used them without interpretation or translated and published anything coming from those publications uncritically. These publications were created by China especially for an international use. pp 379-380. 8 L. 4.1.R.a result that the three objectives changed.cfm?iCntno=341> (14/4/2009). So they were provided in various languages and a global distribution network was developed as well. Historical Dictionary of the People’s Republic of China. The vast majority of Chinese publications. Sullivan. a) Foreign Languages Press Foreign Languages Press (FLP) was established in Peking on the 1st of July 19526. The most significant Chinese publications are briefly described next. Historical Dictionary of the People’s Republic of China.
massline. A description provided by Guozi Shudian in the same letter as above states: Peking Review gives you: * China's views on current international questions * Theoretical articles and important documents * Authoritative coverage of developments in China * Illustrations. 16 9 . member of the Communist Party of Greece (marxist-leninist) and member of the AMEE11 (Militant Front of Greeks Abroad) in Incomplete archives of Peking Review issues can be found at: <http://www.htm> (14/04/2009) and http://www. maps and charts Airmailed to subscribers all over the world Spanish & French10 editions also available. Peking Review had been the main source for m-l newspapers and periodicals while FLP was providing booklets. b) Peking Review Peking Review9 was as significant as the FLP.osaarchivum. 10 The French edition was identical with the English one but the magazine was called Pekin Information instead http://www. cartoons. The Greek version was published by FLP in 1969.There was only one exception of a Greek FLP publication. which concerned what is alleged to be the most printed book in history.org/subject/china/peking-review/index. This had to do with the fact that the main cores of Greek M-L especially during the Junta (1967-1974) were based in France and Germany. Like FLP publications.marxists.htm (14/04/2009). better known as The Little Red Book. It was active in the period 1968-1974 and its most significant branches were in Paris and in Italian cities. According to Stelios Agoutoglou in an interview for the purposes of this research (Thessaloniki. 11 AMEE was a mass anti-junta organization related to the Organization of MarxistsLeninists of Greece (OMLE). This weekly English-language news magazine was launched on the 4 March 1958. the “Quotations of Chairman Mao Zedong”.shtml (14/04/2009). 30 March 2009). pamphlets and books. it reproduced articles from the publications previously mentioned as well as articles of the New China News Agency (Xinhua).org/PekingReview/index. Greek Marxist-Leninist publications mainly used as the basis of translations Peking Review as well as the French and German editions of it.org/files/holdings/300/8/3/text/104-7.
) [Revolutionary Communist Movement of Greece] is a marxist-leninist organization established in 1970 in West Germany. Kokkine Simea.K.K.2 Distribution Guozi Shudian. from 1968. 6. Its news reached all Marxists-Leninists worldwide through Peking Review and the other international editions that the Communist Party of China and the Peoples Republic of China published. September 1975. It established its first affiliate abroad in London in 1947. led by Giannis Zachos: “A bad impression was created by EKKE12 […] where after ‘analyzing’ the international contradictions (as if they are the only ones reading Peking Review) […]”. in 1976 . The significance of Peking Review is stressed in an awkward way in page 3 of issue no.worldwide. 6 of the periodical Kokkine Simea (Red Flag) organ of the Communist Party of Greece Marxists-Leninists (KKE/M-L). no. It was established as Red China News Agency in November 1931 and changed its name into New China News Agency (Xinhua) in 1937.1.Italy.1. China’s national news agency has been the main news source for China’s newspapers and magazines and by extension for m-l periodicals – until the revisionist turn in China. was the (official) governmental distribution channel through which the aforementioned publications and serials were exported worldwide. Pekin Information that according to him could be found easily had been the main source for the articles translated and used in publications of Greek marxists-leninists of Italy.13 c) New China News Agency (Xinhua) Xinhua.E. a small m-l organization constituted mainly by Greek students and immigrants living in West Germany. AMEE’s key publication was Laike Enoteta (People’s Unity) published in Modena. 13 Giro apo ta gegonota tes 23 Ioule 1976 (Around the Facts of the 23 July 1976). It’s translated as China Publications Centre and it literally Epanastatiko Kommounistiko Kinema Elladas (E. established in December 1949. 17 12 . 4.
fifth ed. Spanish. Vietnamese. organizations and individuals ordered and subscribed to any Chinese publications.. Thai. French. Peking. states for one of the Foreign Languages Press Peking publications: “It is available in 14 languages.osaarchivum. * Provides readers with the latest publication news from China. Payment with order or after delivery. Arabic. Russian.means “International Bookshop”. In June 1963 a letter and catalogue from Guozi Shudian. and also accepts blanket orders from them. exporters and importers of books and periodicals to a subscriber. Italian. 15 <http://www.14 Through this organization bookstores. It is still active today. Esperanto. 18 14 . Landsberger there had even been Renmin Shudian (People’s Bookstores) in various European capital cities. Spanish. In the bibliography of Edgar Snow’s Red Star Over China . China’s Economic System. including English. According to Stefan R. * Supplies free specimens of the foreign language periodicals of China for a trial reading upon request. Donnithorne. French. A potential reader would A.shtml> (14/04/2009). This Department: * Handles orders for the foreign language books and periodicals of China from readers direct. Japanese. * Supplies readers abroad with catalogues of the foreign language books and periodicals of China. p. * Recommends books and periodicals to readers according to their requirements. Russian and German” and for some other publications of the catalogue: “The above publications are available in English. German. 325. 15 Further on in the same letter the following is stated: The Mail-Order Department of Guozi Shudian.which is considered as one of the classics concerning the Chinese communist movement – the reader is referred to Guozi Shudian in order to obtain a complete lists of the works published by FLP in English and French. etc”. is pleased to offer its service to readers in all parts of the world. and introduces to them important Chinese publications.org/files/holdings/300/8/3/text/92-1-251. (Routledge: London 2008).
16 In the latter case the reader could get a catalogue.net/resources/landsberger-confessions.1.php> (24/06/2009). This change in politics had an impact in m-l publications on a global scale since although a minority continued publishing Chinese articles and distributing Chinese titles for a couple of years after Mao Zedong’s death.first visit them as well as Maoist and other political group bookstores in order to obtain material related to China or Marxist-Leninist issues or contact the Guozi Shudian directly.1. 4.4 The Decline After the death of Mao Zedong and the rise of Deng Xiao-Ping in 1976.1. The other way to get that material would also be by visiting Chinese Embassies. By the late ‘70s this was almost terminated due to the political circumstances since the revisionist turn of Chinese politics became clear to the vast majority of m-l groups and parties. the Communist Party of China changed its politics abandoning the revolutionary MarxistLeninist perspective and turning to revisionism like the Soviet Union had done twenty years before. That caused a crisis within the Marxist-Leninist movement and a gradual reduction of the Chinese publications for the international movement can be observed. order and receive printed material via airmail. This was done mainly during the first years of the Sino-Soviet split (1963-1964) within the International Communist Movement. promote and distribute its publications since the aim was to promote their ideological. etc. Greek political refugees living in the Eastern Block after the defeat of the Greek Democratic Army in 1949 did this. political and tactical views against revisionism by propagating their theory and practice and conducting polemics towards revisionist ideological and theoretical documents as well as revisionist actions and stand towards international events and issues such as the Cuba missile incident.1. Czechoslovakia 1968.3 Chinese policies During that period China had no copyright laws and on the contrary encouraged people to use. Publishing activity was not seen as a trade (economical) activity but as political act. 19 . This 16 <http://chineseposters. 4.
etc. For these purposes they established the 8 Nentori (8 November) publishing house in Tirana. editors etc) as well as distribution agencies.6 The role of Albanian publications For a long time. the Labor Party of Albania under Emver Hoxha and the People’s Republic of Albania played a similar role for the m-l movement as the Chinese did until 1976 and the death of Mao. 4. This had an impact especially in the M-L press and periodicals where a significant part of their content was taken by translations of Chinese publications such as articles from Peking Review. In the case of Greece. This publishing house published political works.caused a serious blow to the m-l publishing field in Greece as well. This was a direct result of the dynamics created by the SinoSoviet split and the development of the Marxist-Leninist (also known as Maoist) movement on a global scale.early 1979. This was probably done in an attempt of the Greek publishing houses to imply a connection with China and thus of the authority that such a relation would provide to the Greek M-L movement that would appear as the “ambassador” of China. until roughly late 1978 . 4. In most cases of translations of Chinese documents the format and the covers of the Greek translations were identical with those of the originals (Chinese). This publishing activity expanded and became more systematic during the period of the Sino-Soviet split and after the revisionist split in China it gradually came to an end. French.1. this caused a split within the M-L movement (similar to what happened in other countries as well) in 1976. Arabic and other alphabets. Greek.1. The Greek Minority in Albania published its own newspaper in 20 . This was in parallel to the Chinese influence since these two were the main opposition to revisionism as the Soviets and its allies expressed it.1. printers of Latin. the CCP and the Chinese state created publishing houses (and in extension positions for various agents including translators into at least a dozen languages. This had an impact to the M-L movement outside China as well. A very significant source of political and ideological documents but also of prestige is now gone.1.5 Synopsis In conclusion. which is of our interest. Same goes with Albanian publications. in English.
Enver Hoxha denounced Mao Zedong and the Cultural Revolution causing a split in the m-l movement that had more or less the same result as in the case of China (1976). such as Canada or even Australia. Laiko Bema was a key source of information in print (Radio Tirana was also available with broadcasts in Greek) since there was no need for any publishing procedures such as translating or printing by the Greek Marxists-Leninists rather than just distributing it to their followers. Laiko Bema. Albania Today and New Albania were bimonthly political and informative reviews published in during the 70s and the 80s. Spanish and German and served the same purpose for the Albanian regime as Peking Review did for the Chinese regime and which was described before. 21 17 . French. It was then translated and published in 1979 in English.17 It contained translated articles from Zeri i Popullit (Voice of the People). Some information on these periodicals can be found in the Open Society Archives website: <http://osaarchivum. The newspaper was provided by either Albanian embassies (Eastern Block countries) or by other Albanian authorities in case there were no bilateral relations between Albania and the country the Greek MarxistsLeninists lived.Argyrokastro since 1945. Some organizations that disagreed with the viewpoint of Albania. was the newspaper of the minority and is still active with a different political orientation since the change of the regime in the early 90s. Arabic. 18 Unfortunately and due to the fact that Albania didn’t have the special weight China did within the m-l movement and as far as international politics are concerned less information are available. stopped using Albanian material and that had a negative impact in the m-l movement and thus on the Greek Marxist-Leninist publishing field. which was the official organ of the Party of Labor of Albania. Italian. It was called Laiko Bema (People’s Podium) and it was the organ of the Democratic Front of the District of Argyrokastro for the Greek Minority. then autonomous and after 1921 part of Albania. Even though Albanian documents Greek population has been living in South Albania or North Epirus for centuries. This district was first part of Greece. They were published in Albanian.18 In April 1978 Emver Hoxha published Imperialism and the Revolution in Albanian and distributed it within the Party of Labour of Albania. Russian. English. In this book.org/library/periodicals?idx=Countries&id=2> (04/08/2009). Greek M-L organizations had access to Laiko Bema through Albanian embassies and used it as a source or reproduced its content for their own publications.
a two-page daily news report. Engels. H ekdotike peripeteia ton Ellenon Kommouniston: Apo to vouno sten yperoria 1947-1968. Athens 2003.html> (04/08/2009).19 5. that was leading the Democratic Army of Greece. Ai Stratis. Khrushchev: The Secret Speech – On the Cult of Personality <http://www. Matthaiou – P. etc). Also Mao Zedong and his comrades of the Communist Party of China ideas weren’t unknown to Greek communists before 1963-64. From the establishment of the Democratic Army of Greece. in October 1946.fordham. In the lists below we will not mention the works of Marx. 22 19 . Bibliorama – ASKI.20 In the ASKI digital collection of the Democratic Army of Greece.edu/halsall/mod/1956khrushchev-secret1. Greek Marxist-Leninist publications Although the m-l publishing field as such had been created in the early ‘60s. 20 A. Stalin became a persona non grata for revisionism after it prevailed in the International Communist Movement in 1956. duplicators and moving presses where placed in the dugouts where the General and Peripheral Headquarters were stationed. p.didn’t have as prominent position in the Marxist-Leninist press as those of China it still affected them. 5. 2 The issue of Stalin was debated during the 20th Congress of the Communist Party of the Soviet Union. Publications as well as articles in the progressive and communist press about China had been available since the mid 20s. For more details on the position of the new (revisionist) leadership of the CPSU read Nikita S. gave a lot of attention to the ideological work (political educationenlightenment and culture) and propaganda apart from the exclusively military aspect of the Democratic Army. Poleme. 19. in Greece it happened in a slightly different way due to the unique political circumstances that were mentioned above (Tashkent 1955.1 Greek Civil War (1946-49) During the civil war the Communist Party of Greece. Lenin and Stalin that were published up to 1956 and which are m-l publications because until then there wasn’t any debate on the issue since revisionism did not openly confront m-l principles.
28.Ε. 8th and 9th of June issues of the Russian newspaper Pravda. 24 The following publications are part of the Digital Archive of the Democratic Army of Greece of the Contemporary Archives of Social History. 98 pamphlets and books (including one in English.28. p. 167. 2. This 57-page booklet was translated from the 7th.111/ds/tree. 22 <http://62.mainly Eleftheri Ellada [Free Greece] printed them. This 16-page booklet was translated from the Russian newspaper Pravda. issue of the 6th of July 1949.asp?mynode=73040&afteroot=~Εκδόσεις%20του% 20Βουνού%20(Δ.24 The press of the Communist Party of Greece and the Democratic Army of Greece .magazines21 (a biweekly and a monthly). by Liu Shiaoqi published by Eleftheri Ellada. E Dectatoria tes L.)> (04/08/2009). Alexatos . tou Kommounistikou Kommatos tis Kinas [The dictatorship of People’s Democracy] by Mao Zedong Chairman of the Central Committee of the Communist Party of China published by Eleftheri Ellada.23 This is the first time we have the translations and publications of ideological. 25 A.103. 23 <http://62. G.Σ.Ε.%20Εφη µερίδες> (04/08/2009). the following had been published during that period: 1. Istoriko lexiko tou ellenikou ergatikou kinematos.Ε. H ekdotike peripeteia ton Ellenon Kommouniston: Apo to vouno sten yperoria 1947-1968.111/ds/treeres.asp?mynode=73519&afteroot=%20~~Δ. Athens 2003.. published in the press office of Eksormisi26 in 3000 copies on January 1949.Σ. July 1949. 101 pages. 26 Eksormisi was the newspaper of the Democratic Army of Greece from 1947 until 1949. Demokratias.%20Περι οδικά> (04/08/2009). <http://62. tou Mao-Tse-Toung Proedrou tis K. Diethnismos kai Ethnikismos [Internationalism and Nationalism].N.111/ds/tree.103. five in French and two bilingual. Poleme. 11 newspapers22. According to the archive of the Democratic Army of Greece and the archive of Left and Culture belonging to the Archeia Sygchrones Koinonikis Istorias [Archives of Contemporary Social History] in Athens and the very well documented work of Matthaiou and Poleme25 on the publications of Greek political refugees during the period 1947-1968.111/ds/> (14/04/2009). (Geitonies tou kosmou: Athens 2006). Matthaiou – P. 3.asp?mynode=75818&afteroot=%20~~Δ.Σ. 23 21 .28. Strategeka Problemata tou Epanastatikou Polemou tes Kinas [Strategic Problems of the Revolutionary war of China by Mao Zedong]. English-French) can be found.E.28. Athens <http://62.103. Bibliorama – ASKI. political and military Chinese documents.103.
1954). 26 pages.4. September 1949 an article on the liberation struggle of the Chinese people by the Supreme Commander of the People’s Liberation Army of China Zhu De was published. September 1949. 24 27 . in order to raise the moral of the fighters since both the Greek and Chinese people conducted a national liberation struggle at the same time period although they ended in the opposite way. no. Every morning at dawn My heart is shot in Greece. And then every morning. Stechia gia to laiko apeleutherotiko strato tes Kinas [Facts for the People’s Liberation Army of China] by Siao Hua. A five page (pp.27 Neos Kosmos. 200. In 1948 issues 4 and 5 (1st year). doctor. The first issue (second year) of the magazine published in January 1949. March 1949 by Lefteris Eleftheriou. pp 35-36. 28 N. This was expressed in the poem ‘Angina Pectoris’ of the Turkish revolutionary poet Nazim Hikmet: If the half of my heart is here. published a fraction of the aforementioned Mao’s booklet Strategic problems of the revolutionary war in China. the monthly military-political organ of the General Headquarters of the Democratic Army that was the communist army during the civil war (1946-49) published translations and summaries of such works. (New York: Masses & Mainstream. April and May respectively published in two series part of Edgar Snow’s Red Star over China. The reasons for such publications on behalf of the Democratic Army of Greece leadership are dual. Firstly. published by Eleftheri Ellada. In addition in issue 9 (second year). which is considered until today a classic book on Chinese Communists. stating that the whole book is going to be published. Hikmet. 28 A book review on this book can be found in the newspaper Leuteria [Freedom]. 347-352) book report on the same book (incorrectly stating that it was published in February 1949 instead of January) can be found in issue 5 (second year). 28th of October 1949. The Greek revolutionaries were defeated while the Chinese won. doctor The other half is in China With the army going down towards the Yellow river. Poems.
mainly in the capital of Uzbekistan.2 Publications in Exile (1949 – 64)29 After the defeat of the Democratic Army of Greece in the end of August 1949 Greek communists .were forced to abandon the country and resided in countries of the then Eastern Block. 5.about 50. Despite the fact the debate within it the clash between the two political lines (revolutionary-revisionist) was initiated in the mid-50s the official split – as in an organized political organization of the Marxist-Leninist political refugees took place almost 10 years later in 1964. magazines but also books. literature and politics. that the Greek communists started studying these works while seeking solutions to the problems they were facing during the Greek Civil War.Secondly. This included newspapers.R. Mao Zedong developed the theory of People’s Protracted War through his military works. There is a case that due to the military advancements of the Chinese communists that became known worldwide through communist press such as the Russian newspaper Pravda. Hungary. The latter can be categorized in school books that were used for the education of the young children forced to leave Greece due to the war.R. Tashkent where about 15. at least for part of the Greek communists.S.S.S. 25 29 .000 of them were placed. From the very beginning under the guidance of the Communist Party of Greece they started their publishing activity.000 men. Despite the reasons that the leadership of the Communist Party decided to publish those documents the fact is that it gave the opportunity to its members to get to know Chinese communists works and Mao Zedong’s in particular something that was later on important for the Marxist-Leninist movement and Marxist-Leninist publishing since these ideas were already introduced and there was some familiarity with them. women and children . They were transferred to these countries through Albania but probably due to the fact it was the poorest country they were not stationed there but sent to the other Eastern Block countries and the U. Romania and the former U.S. It cannot be easily determined when to separate the publishing activity from revolutionary to revisionist as far as the official Greek Communist Party press is concerned. such as Bulgaria.
[…] Those who attempted to find the documents of the Communist Party of China. most probably due to the Sino-Soviet split that occurred in the meantime. mainly newspapers. They bought the editions of Pekin Information containing the documents of the letters of the Communist Party of China30 in order to make them vanish. More have taken place. The exchange of letters between the two parties has been the most known debate (polemics) between Marxism-Leninism (represented by the positions of the Communist Party of China) and Revisionism (leaded by the Communist Party of the Soviet Union. Hontzeas is referring to the series of letters that the Central Committee of the Communist Party of China sent to the Central Committee of the Communist Party of the Soviet Union in 1963-5 concerning the General Line of the International Communist Movement. apart from the measures they faced (threatened to be expelled. Some publishing activity was conducted in the other countries as well. It was going to be the first out of the four volumes of Mao Zedong’s Selected Works published in China in 1951. These books were consumed mainly among Greek political refugees and among Greeks living in Western Europe since they were illegal in Greece. Romania in 1954 and stopped its activities in 1968. The main publishing house was Politikes kai Logotechnikes Ekdoseis [Political and Literature Publications] founded in Bucharest. This publishing house translated a volume of Mao Zedong’s Selected Works from the Russian edition in April 1957 in 5000 copies.Publishing activity was controlled by the Communist Party of Greece and was mainly conducted in Bucharest where the Party headquarters were and the publications were then distributed to the rest of the Greek political refugees communities. being expelled from the Communist Party). the Chinese didn’t initiate their polemics at the time. 26 30 . were often facing tremendous and often unovercamable obstacles. It is most likely that this happened because although the revisionist turn in the USSR (1956) and within the Communist Party of Greece (1955-56) had already began. A second volume was ready to be published afterwards but never did. This can be supported by the fact that according to one of the leading cadres of the M-L movement in Greece in the 60s Yiannis Hontzeas talks about censorship on behalf of the revisionist leadership of the Communist Party of Greece in order to keep their members in the dark: Acquiring documents with the Chinese positions was like committing “suicide”.
they provided a ‘summary’ and called those present to decide [on who is right and who is wrong]. the following book references can be found: 1.Publishers instigated by leaders of Communist Parties loyal to the ‘head’31. pp. 54. The bibliographic note for the publishing production of July-August of 1951. the publishing Nea Ellada (New Greece) published a collection entitled Pos nikise on kinezikos laos [How did the Chinese people win]. Wherever a discussion on the polemics took place they didn’t provide the documents of the Chinese letters. 2. states36 that in August. the democratic one. Those who finally obtained the documents were under a load of blackmails. Neos Kosmos. issue 3 (third year). September 1951. in the political-theoretical magazine Neos Kosmos33 (New World). To “telos” tou kommounismo [The “end” of communism]. Neos Kosmos. issue 1 (third year).35 Until the time of the Sino-Soviet split in the mid-60s the publications of the Communist Party of Greece spoke very highly of Mao Zedong and his theoretical works. issue 9 (third year).32 Apart from the above publication. printed the documents and then they made them vanish. for People’s Democracy] for the 30th anniversary The “head” is the Communist Party of the Soviet Union. p. Y. March 1951. The bibliographic note of the publishing production of 1950 states34 that among others. This was a collection of articles published in the newspaper Gia statheri Eirine. (Athens: A/Synecheia. Romania from 1949 as a biweekly magazine and from 1950 until October 1974 when it stopped being published as a monthly magazine (Alexatos. but concisely and guided. This was the exception. p. January 1951. 1993). organ of the Central Committee of the Communist Party of Greece. Neos Kosmos. the books Nea Kina [New China] and E agrotike metarythmise stin Kina [The agrarian reform in China] by Liu Shiaoqi in 3000 copies had been published in order to know socialist countries such as China and their problems better. 61. The bibliographical note of the publishing production of January-February 1951 great emphasis is given on the publication of Mao’s philosophical works On Practice and On Contradiction which in 3000 copies. 33 Neos Kosmos was published in Bucharest. 44. 36 Oi ekdoseis mas sto dimeno Ioulios-Augoustos. 35 Oi ekdoseis mas to dimeno Genari-Flevari 1951. gia te Laiki Dimokratia [For stable Peace. pp 4344. 3. 34 Oi ekdoseis mas sto 1950. 32 31 27 .. p. 322. 318). Istoriko lexiko tou ellinikou ergatikou kinematos. Hontzeas . G.
Up to then the source of Chinese documents had been the Soviet press. 5. Peking . 28 37 . Lu Dingyi. from the Sino-Soviet Split and until the death of Mao Zedong. Politikes kai Logotechnikes Ekdoseis 1955 in 3500 copies. anti-MarxistLeninist titles such as the series titled “For the unity of the World Communist A. and To ogdoo pankineziko synedrio tou Kommounistikou Kommatos tis Kinas [The eighth all-Chinese congress of the Communist Party of China].the publishing house that later on fed the m-l press with material for almost two decades.3 M-L publications turning into revisionist Later on after the revisionists with the help of the Soviets and the other Eastern Bloc parties took control of the leadership of the Communist Party of Greece in 1956 – and all its activities including publishing – they turned publications into revisionist as well. Deng Yung. Also there had been other publications like: Ekti (Platia) Olomeleia tou Kommounistikou Kommatos tis Kinas – Zetemata syneteristikopoiisis stin agrotiki oikonomia Mao-Tse-Ntoun [6th (broad) Plenum of the Central Committee of the Communist Party of China – On collectivization in agriculture economy by Mao Zedong]. It was printed in August 1951 in 3000 copies. pp 96-99. This was. H ekdotike peripeteia ton Ellenon Kommouniston: Apo to vouno sten yperoria 1947-1968.of the Communist Party of China (CPC) preceded by the article of Mao Zedong On the People’s Democratic Dictatorship written for the 28th anniversary of the CPC. There had been also publications on China from non-Chinese authors. Matthaiou – P. Deng XiaoPing. The other articles were written by Zhu De. We also find a translation that comes from the French edition of Foreign Languages Press. Thirty years of the Communist Party of China by Hu Qiaomu. It was explicitly stated that books that “are not compatible with the decisions of the 6th plenum of the Central Committee of the Communist Party of Greece and of the 20th Congress of the Communist Party of Soviet Union” should be withdrawn from circulation. Politikes kai Logotechnikes Ekdoseis 1957 in 4000 copies.37 After the Sino-Soviet split they started publishing anti-China. Poleme.
of this section . They published for example the Three Statements of the Soviet Government explaining its side of the story for the split but never did the same with the Chinese side. They also conducted extensive censorship. This series included 6 titles written by Soviets and other revisionists.Movement”. Hoxha and concerning Albania had been withdrawn from the bookshelves from the very beginning (1955-7). One example is the novel Matomeno Eliovasilema [Bloody Sunset] by a V.1 Exiled and Censored In the meantime m-l books. Matthaiou – P. 5. Manuscripts of m-l literature ready to be printed by the previous revolutionary literature and essays never seen the light of day and stayed into some party official’s drawers if not destroyed. All the above publications . H ekdotike peripeteia ton Ellenon Kommouniston: Apo to vouno sten yperoria 1947-1968. Poleme. In the future the Chinese sides documents were not to be published along with the Soviet sides and in fact weren’t published at all so that the Greek communists wouldn’t be able to compare the two political lines. Also the Open letter of the Central Committee of the Communist Party of the Soviet Union to the communist organizations and all the communists of the Soviet Union. In March 1965 the Enlightenment Committee that decided if a book would be published or not and what changes or corrections should be made erased all references to Zachariades – the former General Secretary who was illegally dethroned by the revisionists and also references to Mao Zedong.were printed in 1963.38 A. pp 665-666. 29 38 . both Greek titles such as those by Nikos Zachariades former General Secretary of the Party and foreign titles like those of Stalin. Vardinoyiannis published in 1966. This was the initiation of the polemics in print between m-l and revisionism and it included for the first and last time the Open letter the Communist Party of China sent to the Communist Party of the Soviet Union as well. Also books exposing Tito’s revisionism had been withdrawn since Tito reestablished the relations between Yugoslavia and the Soviet Union and thus with the rest of the revisionist parties such as the Communist Party of Greece in the mid-50s.3. A bit later on the same happened with books of Mao and Chinese documents.
318-322. 30 39 . pp. One was saved by AMEE in Italy and the other has mysteriously vanished although some news reports claim he was murdered. political refugee at the time in former Czechoslovakia writes in his memoirs40 that there – in the organizations of the Communist Party of There had been two known cases of such deportations of Greek marxists-leninists. This is the maybe the most intriguing part of Greek m-l publishing but most certainly the most difficult to conduct research on. M-L publishing by political refugees was conducted in the most difficult conditions. publishing activity took place among political refugees that lived in the former Soviet Union and in the Eastern Block after the defeat of the Democratic Army of Greece (August 1949) and after their repatriation to Greece in the mid-70s.6. exile. As it will be seen further on the existing sources are sometimes contradictive. they were living in foreign countries where the (revisionist) regimes were opposing their ideas. Only a few of them have published some sort of biography on their lives when they were political refugees and they usually don’t mention much on the publishing aspect of their m-l activities and even that is done in a rather general way. They were conducting political and thus publishing activity under conditions that were at least unfriendly to them in two ways. Ektos ton teichon.39 Secondly they were members or former members of a revisionist communist party that was also against them and it would turn them in without second thoughts. lose their jobs or even be deported in a period that Greece was under a dictatorship but even if Greece wasn’t under dictatorship nobody would hire them since they were communists. Firstly. Publishing among Greek Marxist-Leninist Political Refugees (1960-1974) As seen above. Also primary sources such as the products of their publishing activities. Tes Ges oi Kolasmenoi (The Damned of the Earth). like newspapers or pamphlets are extremely rare. This shows how strong the dynamics were created by the political situation that led them to conduct publishing activity under such great threats to their lives. Evgeniades. and their existence is mainly known through the aforementioned biographies. Giorgos Evgeniades. 40 G. Athens 2008. This meant that they could be easily sent to prison. There are also great difficulties in conducting research on this issue for numerous reasons. Most of the protagonists of this political and publishing activity are either dead or quite old.
liberation and transformation. 218.was the first major conflict between Marxists-Leninists and revisionists in the mid-50s. The Chinese also promised to provide them with all the publications coming from Peking.Greece abroad . The material was sent via post in order not to be confiscated and they were going to distribute it to the Czech workers they were He incorrectly sets the time of the Congress in 1962. liberation and transformation. This led the Chinese to make the polemics official. 31 41 . Brugger. This inevitably laid the ground for the establishment of M-L groups and thus M-L publications.. There the Albanians promised them to send them political documents written in Czech and the newspaper Laiko Bema. There was an alleged (phrasal) attack from Khrushchev . B. the soviet specialists that were sent as technical support to China and Albania as well as the financial help (loans) were withdrawn. Brugger.the General Secretary of the Communist Party of the Soviet Union – towards Mao Zedong during the conference.. Less than a year later the Twenty-second Congress of the Communist Party of the Soviet Union took place in October 1961. 42 B. This continued at a plenum the Communist Party of the Soviet Union held in July the same year and about the same time they suspended the journal of the SinoSoviet Friendship Society. China. At the same time in order to blackmail Albania and China. The Congress of the Romanian Workers’ Party and the Conference of the Communist Parties took place in July 1960. China. There. Khrushchev denounced Albania for its opposition to the Soviet political line. also sending a message to China that it would be next. which as mentioned before was published in Greek. 19421962 (Lanham: Rowman & Littlefield 1981). p. p. where a conference was held between Communist Parties no communiqué was published as it usually happened in such occasions because some parties rejected the Soviet revisionism such as allegations and accusations against Stalin and the period he was leading the Soviet Union and the theory of peaceful coexistence of socialism and capitalism. 1942-1962. The rapprochement of Tito and Yugoslavia that split from the International Communist Movement in 1949 on behalf from the Soviet leadership as well as the Cuban missile crisis where the Soviets played a political game on the back of the Cuban people in order to serve their rivalry towards the United States. Especially after a Congress of the Romanian Workers’ Party (the communist party in Romania) in Bucharest in 196041. 218.42 So the Greek Marxists-Leninists in Chechozlovakia visited the Chinese and Albanian embassies.
Rizakis. The Chinese Embassy at his request sent these documents to him. Evgeniades. They were serving more as for providing general information on China and focused on cultural issues than ideological up to the split in 1963 nor it had gained the popularity it did after 1963 that made its publishers to translate it in a diversity of languages. Furthermore he states that they also got Laiko Bema from the Albanian Embassy and other ideological material from the Albanian and Chinese Embassies. a political refugee living in Poland at the time describes the situation in a similar manner in his autobiographical book on the life of political refugees. 46 See pp 22-23. 164-165. St. publishing and printing) as well as distribution agencies. pp 118-123. He circulated them among his colleagues in the factory where he worked. Athens 1994. Odoiporiko: Anadromi ste zoe kai drase ton politikon prosfegon. Some periodicals (Peking Review) and publishing houses (Foreign Languages Press. This was done in order to inform them about the ongoing discussion and polemics within the International Communist Movement and especially the position and arguments of the Communist Party of China. For reading and circulating these documents he was expelled from the Polish United Workers’ Party (the Communist Party in Poland). 44 43 32 . Tes Ges oi Kolasmenoi. pp. So it can be said that the political situation created such dynamics that the Chinese and Albanians created publications and founded publishing houses (production.45 This is the same kind of behavior towards anyone reading.working with in the factories.46 Revisionists forbade Marxist-Leninist documents and those that did not comply would face severe punishments from being expelled from the Party to losing their jobs or even exiles. 45 St. Party of Labour of Albania and other antirevisionist forces.44 After the split between the Soviets on one hand and China along with Albania on the other hand the latter started circulating ideological articles documents in Polish. pp 318-320. Rizakis.43 Stefanos Rizakis. G. Peking) were founded before the Sino-Soviet split but didn’t have the same purposes nor the same necessity. agreeing or distributing m-l documents that Hontzeas described concerning the Communist Party of Greece. Odoiporiko: Anadromi ste zoe kai drase ton politikon prosfegon [Peregrination: Retrospect to the life and action of political refugees].
33 47 . m-l political refugees established an antifascist-anti-junta front in Poland called AMEE (Antidiktatoriko Metopo Ellenwn Eksoterikou / Antijunta Front of Greeks Abroad). They illegally published and circulated around thirty copies of a typewritten monthly information bulletin. Firstly in order to organize themselves by finding those who were still loyal to the m-l ideology and rejected the revisionist turn in the Greek and International Communist Movement. pp.written in 1958 by a political refugee. 161-162. frequency of publications etc would have never become so prominent if it had not been for the creation of the Marxist-Leninist movement. This was managed by an editorial committee and had three persons in charge. But the political refugees themselves started their own publications apart from distribution Chinese and Albanian m-l documents. Oidoporiko: Anadrome ste zoe kai drase ton politikon porsfygwn. So letters or documents were composed by Marxists-Leninists and then were circulated among political refugees to be read and if the political refugees agreed with the content of these documents they signed them. Rizakis. They also handed it to a member of the Central Committee of the Polish United Workers’ Party after adjusting it and after his proposal. Greek Marxists-Leninists were both users in order to fulfil their need to understand the situation better and get ideologically and politically stronger but also the distributor in order to promote the ideas they shared and expand their influence by exposing revisionism to the other political refugees and organizing themselves against the revisionist leadership.48 The political refugees who had been expelled from the Party or left the Party due to their disagreement with the change of the political line of it from revolutionary to revisionist. 172.The diversity of languages. After it had been approved by the coordinating committee of their newly formed m-l group in Poland they handed it to political refugees that up to then were members of the Communist Party of Greece and as a result 650 of them signed it. Rizakis refers to such a (typewritten) document 40-page long . p. 48 St. the ‘Communist Party of Greece St. to the embassies of the other Socialist Countries as well. comments and news mainly from Greece.47 During the Junta. Rizakis. one for the editorial committee and two to gather material and write. created their own organization. Oidoporiko: Anadrome ste zoe kai drase ton politikon porsfygwn. titles. It included articles.
52 P. 291. p. (Panteio Universiteio: Athens 2002). Rizakis. Danielides. Athens 1990. There is the possibility that this information is not accurate since there are conflicting sources. p. According to the President of the temporary Central Committee of CPG (m-l). Danielides. Odoiporiko: Anadrome ste zoe kai drase ton politikon prosfygon.50 The m-l political refugees also subscribed to the Greek m-l monthly periodical Anagennisi after they found out about its existence – with the only exception those that lived in the Soviet Union due to currency restrictions.51 They also distributed magazines and newspapers from other countries such as the Greek newspaper Laiko Bema that was published in Argyrokastro of Albania and the foreign languages magazines of the Chinese Communist Party. 172. 448. 295. O Polydoros Thimatai. (the first issue was published in September 1968). p. Odoiporiko: Anadrome ste zoe kai drase ton politikon prosfygon. Istorikes Ekdoseis. 291. Giorgos Giannakopoulos states53 that the Marxists-Leninists political refugees published two monthly newspapers. they published a magazine named Epanastatis (Revolutionary). Rizakis.(marxist-leninist)’. 53 G. Polydoros Danielides49. 51 St. O Polydoros Thimatai. Spitha (Spark) in Romania and Epanastati (Revolutionary) in Czechoslovakia from 1964 and presents them in his bibliography as well. Giannakopoulos. p. 170 and Danielides P. This was a monthly magazine and on behalf of the Secretariat of the temporary Central Committee of the CPG (m-l). Paschalis Vaskos was in charge of publishing and distributing the magazine as well as other periodicals such as Laiko Bema and other foreign language press of the Communist Party of China. 50 St. This started in the mid 50s after the events in Tashkent and continued until the late 70s when most of the political refugees returned to Greece after the fall of the Junta in 1974. p.. O Polydoros Thimatai (Polydoros Remembers). This group provided the political refugees with a duplicator for their publishing needs. which was the country where the Temporary P. Epanastatis was published in Romania and not in Czechoslovakia. Of course due to the increasing censorship towards m-l ideas if Anagennisi was discovered at the post office it was confiscated. 34 49 . Danielides also mentions52 the establishment of an m-l group in West Berlin that had a very active publishing activity. Oi organoseis tis eksokoinovouleutikes aristeras sten Ellada ten periodo 1956-1981 [Organizations of the extra-parliamentary left in Greece during the period 1956-1981]. p.
Oi “marxistes-leninistes” politikoi prosfyges sten Anatolike Europi (1964-1974) kai to paranomo deltio “Epanastatis” [“Marxist-Leninist” political 35 54 . 1-15 April 2003. 295.Central Committee . which according to Koulouris57 who was able to find some issues of it 100 chronia apo te gennise tou Nikou Zachariade [100 years from the birth of Nikos Zachariades]. since the cause they were called to serve through these publications was more important for them than their own lives. 57 N. Anasyntaxi. Also an article of the newspaper Anasyntaxi54 on the 100 years from the birth of Nikos Zachariades refers to an article of Epanastatis. In Bulgaria and Hungary they would be imprisoned or sent in exile.and of the aforementioned Paschalis Vaskos who was in charge of the magazine – was based. 155.and with whom the Czech branch had relations. Despite these conditions they continued their activities. It is likely that they were able to start their publishing activity around 1968 since that is probably the time they were able to get a duplicator. No. If the regime discovered any illegal publications it would confiscate them and highly recommend the Marxists-Leninists involved to stop acts that could be considered as attempts to reverse the regime but that was more or less it. this group must be OEML [Organosis Ellenon Marxiston Leniniston / Organization of Greek Marxists Leninists] on led by a Yiannis Zachos who used to lead the AMEE branch in West Berlin until he was expelled in 1968. Koulouris. O Polydoros thimatai. Danielides. And also while most sources name Paschalis Vaskos as the one in charge of the publishing activity and namely Epanastatis. In Romania things were more favorable since there were controversies between the Soviets and the Romanian government that the m-l political refugees could take advantage since the anti-revisionist propaganda was considered as antisoviet. He says it was the newspaper of the West Berlin group56 . 56 Although it is not stated clearly. which was according to this article published in Romania in 1969. p. Spitha is not mentioned by anyone while it should have been in his responsibilities. This is known by its subheading. Epanastatis is probably the single official newspaper of the Marxists-Leninists political refugees since this was the official organ of the CPG (m-l). As far as Spitha (Spark) is concerned Danielides55 mentions it in his biography but not as a publication of the Czech branch. 55 P. That was why it was chosen as the basis of the Temporary Central Committee and assumingly of Epanastatis.that provided them with the duplicator as previously mentioned .
58 KKE(m. There was a newspaper called Spitha published in Germany. p. in Mpontila M. p. for that reason and according to Koulouris60 its size was only 25X21 cm. It can only be explained by making an assumption based on the words of Danielides concerning the leadership of Czechoslovakian branch.since it’s a very rare periodical. the second issue was published in Prague. It had organizations in Romania. So he probably published a newspaper but it is more possible it was published around 1968 as Epanastatis rather than in 1964 as Georgakopoulos states in his PhD dissertation. Ekdoseis Panepistimiou Makedonias.S. Regardless the existence of Spitha as an m-l newspaper of the M-L organization branch in Czechoslovakia. Epanastatis would still be the main printed expression of m-l political refugees. Bulgaria.R. 59 His autobiography was not “written” by him. Thessaloniki 2005.l): Kommounistiko Komma Ellados (marxistiko-leninistiko) [Communist Party of Greece (marxist-leninist)]. For example he continued being related with the West Berlin group.S. Danielides59 is probably mistaken since there is no reference to a Spitha newspaper published by any of the m-l West Berlin groups and on the contrary there is evidence the Czech group published it. Poland and Tashkent in U. Hungary. To oplo parapoda: Oi politikoi prosfyges tou ellenikou emfyliou polemou sten Anatolike Europi [Political refugees of the Greek civil war in Eastern Europe]. Oi “marxistes-leninistes” politikoi prosfyges sten Anatolike Europi (1964-1974) kai to paranomo deltio “Epanastatis”. its existence is known mainly through the biographies of m-l political refugees – was the Internal Bulletin of the Organizations Abroad of KKE (m-l)58. 1969. (ed. but in Frankfurt during the Junta and it had a completely different political orientation. was considered to be stubborn and did things his own way regardless what the m-l organization central decisions were. 237. It was a common for illegal publications to come out in small formats since in this way it was easier to hide it or refugees in Eastern Europe (1964-1974) and the illegal bulletin Revolutionary].). it is not usual to print more than one newspaper since a newspaper is usually considered as the organ that expresses its ideological and political views. so it is possible the person that later on wrote it down made a mistake. 36 . Koulouris. 237. Czechoslovakia. Epanastatis as all m-l publications and political activities was illegal for reasons already explained previously.. This assumption is drawn from the fact that although it wasn’t possible to find the first issue. named Labropoulos. extremely hard to find. The leader. He dictated it. Although it is not unlikely for a communist organization to have more than one periodicals or press in general. 60 N.
p. 290 and N. It is certain there were direct or indirect contacts since issues regularly included articles or documents from other m-l publications. the fourth issue was out after twenty-one months in June 1970 and the eighth seven months later. Oi “marxistes-leninistes” politikoi prosfyges sten Anatolike Europi (1964-1974) kai to paranomo deltio “Epanastatis”. pp 236-240. Koulouris further mentions that although there are no facts on which was the last issue it can be assumed that it must have suspended its publication in October 1974 when the greek m-l organizations of political refugees who were based abroad and the one of those in Greece underwent a unification process. Koulouris. N. Of course there is a case they intended publishing monthly newspapers but due to security and other problems. the editing committee and the distribution to the other countries of the Eastern Block as well as Tashkent where the m-l political refugees had branches.distribute it. they weren’t able to succeed in fulfilling such a goal. Although Giannakopoulos referred to the newspaper as being monthly. It is certain that Epanastatis published at least one issue during the last term of 1973 since Danielides refers to the fact that Epanastatis published an obituary of Nikos Zachariades who died in August 1973. from the facts given from Koulouris61 it is proven that it wasn’t. The same thing was done with the m-l press in Greece during the Junta.1 Relations with Greek Marxists-Leninists abroad It is also not known if they sent it to Greek Marxists-Leninists of the West. Danielides. 237. The first issue of this newspaper was printed in September 1968.the monthly periodical of the Organization of Marxists-Leninists of Greece . mainly Laikos Dromos [Peoples’ Way] .which was published in Western Europe and even an article from the newspaper Synepis Pale [Consistent Struggle] of the Greek Marxist-Leninist organization of Toronto. in January 1971. It has already been mentioned that the first issue was published in September 1968. 62 P. O Polydoros thimatai.62 There is no evidence on the print run. Oi “marxistesleninistes” politikoi prosfyges sten Anatolike Europi (1964-1974) kai to paranomo deltio “Epanastatis”. 37 61 . Koulouris. p. 6.
294-296. 240. O Polydoros thimatai. especially in Italy where the front mass organization AMEE set up by the Greek m-l was an appreciable force of the anti-junta movement. They were able to contact the Greek m-l groups. Oi “marxistes-leninistes” politikoi prosfyges sten Anatolike Europi (1964-1974) kai to paranomo deltio “Epanastatis”. It is likely they got the printed material like Laikos Dromos by mail from the Paris branch. (G. 1973. 520). After the collapse of the Junta in 1974 political refugees started returning. 65 Gia to zetema tou Nikou Zachariade [On the issue of Nikos Zachariades]. pp 237.Canada. p. Koulouris. 64 P.63 The known facts are that during the period 1964-1967 the political refugees were subscribers of the m-l monthly periodical Anagennisi (Renaissance) published in Athens and they were able to send some letters to the editors of the periodical which although remained unanswered. Danielides. 64 Giannakopoulos further mentions that the Marxist-Leninist organizations of political refugees published pamphlets apart from their newspaper(s) that were channeled from Romania to Greece through Greek students in Italy especially after 1968. a name originally being used by the political refugees organization from 1964 until the collapse of the Junta. M-L organosi politikon prosfygon Roumanias. p. first in West Berlin through which they contacted with the Paris branch and even sent someone to Paris for discussions. But from 1968 onwards they were able not only to create organizations abroad but also control Greek Student Unions in Western Europe. The 1978 edition that appears with the same title by Istorikes ekdoseis is a new publication and not a reproduction of this title. There was an attempt to get a contact through Bulgaria that has a common borderline with Greece but it wasn’t possible. N.. Oi organoseis tis eksokoinovouleutikes aristeras sten Ellada ten periodo 1956-1981. A pamphlet with the same title was published five years later by the publishing house Istorikes Ekdoseis which belonged to the CPG (m-l) which was established in Greece in 1976 and which was the result of the unification of the m-l political refugees and the m-l living in Greece. 38 63 . This led to absorption of the m-l organizations and thus publications by political refugees from the m-l organizations that were active in Greece and mainly OMLE that in 1976 became CPG (m-l). Two of these pamphlets are known to exist for sure. Giannakopoulos. 1968 and O sosialimperialismos kai e Ellada.65 Although he doesn’t mention why this took place especially after 1968 it can be assumed that this happened since Greek Marxists-Leninists didn’t really have organizations abroad before the coup d’etat on the 21 April 1967. M-L organosi politikon prosfygon Roumanias.
from the defeat of the Germans in 1944 until 1946 and during the 50s-60s.g.g. Morfosi informs the readers it started publishing the four volumes of Mao’s Selected Works. The most significant is probably the issue 23-24. the article ‘The paroxysm of dogmatism and the Cultural Revolution’ by D. July-August 1966. 39 66 . e. which attacked Marxists-Leninists. Despite the lack of publications there had been articles in a lot of left and communist newspapers and periodicals66 on Chinese Communism as early as 1927 but the vast majority until the mid-60s focused on cultural issues. which belonged to the Communist Party.7. the left literacy magazine Protoporoi. Ellenike Aristera. M-L publishing in Greece There is no evidence of Chinese publications in Greece before the Civil War. Engels. November-December 1956 of Epitheorise Technis. The monthly theoretical magazine of EDA in 1963-97. in international and national level.g. So due to the anticommunist legislation and of course censorship it was not possible for m-l works to be published and distributed freely or semi-legally apart from short time periods e. More specifically in the inner back cover there is an advertisement of the publishing house Gnose (Knowledge) for the book E Nea Demokratia (The New Democracy). But even then with lots of restrictions. Iordanides was a member of EDA that was at that time promoting Mao Zedong and his works. the bi-weekly magazine of the Central Committee of the Communist Party of Greece Morfosi until the Civil War. This issue through its advertisements informs us of Mao’s works published in Greece. 67 The publisher of Gnose according to I. It was quite anti-Marxist-Leninist e. mainly illegally since communism in Greece was outlawed from its birth with the establishment of the Socialist Labor Party of Greece (1917) and later on of the Communist Party of Greece (1918) and until the collapse of the Junta in 1974. That of the publishing house Morfosi (Education). quite often as well as the monthly cultural review Epitheoresi Technis also affiliated with EDA published a lot of articles almost exclusively on culture. Works of Marx.67 But it has an even more significant advertisement on page 466. The unofficial organ of EDA – which was the legal expression of the Communist Party of Greece – Avgi including anti-Marxist-Leninist articles after the Sino-Soviet split. Raftopoulos in the issue 139-140. The whole issue was dedicated to China. Lenin and Stalin had been published until then. one of Mao’s most significant works. in the 50s-60s a newspaper or a magazine could not mention as a title or a subtitle the word communism or any of its derivatives. It was published and sold in Such newspapers and periodicals were Rizospastis.
with the collaboration of very well known left intellectuals. p.68 The fact that a trade publisher decided to publish the works of Mao. 7. in newsstands and by door-to-door book salesmen. at the time there was an audience of an adequate size (or at least an increasing reading public) interested in Marxist-Leninist and in particular Mao’s works that made it profitable for a publisher. The third volume was out in 1959 after a great delay and for that reason the fourth one wasn’t out in series but as a single volume. Meeting with Iordanides (23/07/2009).small luxury. The advertisement noted that the first volume would be completed in 3 months time and the whole work in 10 months. leather bound issues every Friday. so in the beginning they used the volumes published by Morfosi as a guide for their own publications. which strengthens the point of Iordanides that EDA was up to the split promoting Chinese works and Mao’s in particular. The first volume came out more or less the same time as the one published by the political refugees. The issues were sold through bookstores. 40 . MARSYAS. The truth is that the whole project was quite delayed.69 Other titles on China were published then such as E epopeia tou kinezikou laou: E Megale Poreia [The epopee of the Chinese people: The Great March]. Athens 1961.2. 22. The people involved in the M-L publishing field were non-professionals. and not just one but all the available volumes at the time which was a time and money consuming project shows that. Later on they were sold bound in two volumes which contained the First and Second volume and the Third and Forth respectively. It was sold in instalments since the audience (mainly young students and workers) would not be able to afford them sold as volumes which would be much more expensive. But these volumes were very important for the creation of the Marxist-Leninist publishing field as well.1 The League of Friends of “New China” 68 69 See Section 5.
Athens 20/5/1960. Kitsiki was even able to persuade intellectuals and moderate politicians to join including Dimitrios Papaspyrou.Established in 1956 after an initiative of the intellectual Beata Kitsiki70 the League of Friends of “New China”71 presented itself to be interested in the cultural and artistic aspect. The League was based in a hall where they held meetings and cultural events on China. Iordanides in Drapetsona. IV. 19 June 2009. Athens. a well-known intellectual.73 7.1. 73 E prote kineziki pneumatiki antiprosopeia stin athina [The first Chinese cultural delegation in Athens]. 75 He is probably the known Greek poet and translator Manolis Cornelios. in 1959. Cornelios75 published in 1966. The last is probably the Selected Works of Lu Hsun.72 In this attempt B. president of the Greek Parliament. The League itself published the quarterly periodical Ellenokinezika Chronika [GreekChinese Chronicles] and in January 1959 it published the book Ancient Chinese Myths.1 “How to know China better” Later on. Kedros. vol. 41 70 . 71 It is also known as: Union of Friends of New China and Greek-Chinese friendship league. The first time any official delegation ever visited Greece was a cultural one invited by the League in May 1960. translated by M. the League in cooperation with the publishing house Feksi. Athens 1982 which is about her personal experience of the Great Proletariat Cultural Revolution in China. Before that. titled H Kina ekso apo ta teichi [China outside walls]. in 1962. Feksi published a travel book about China by Petros Charis74. 74 Alias name of Ioannis Marmariades. a very well known Greek theatre and cinema director. In reality Kitsiki and other progressives and leftists wanted to help China fight against its international isolation by the capitalist-imperialist states. a series of more 30 books of mainly Chinese literature and art were published beginning with the book Chinese Theater which was published in a translation of Takis Mouzenides. Most of the translators were known intellectuals themselves and Beata Kitsiki published the book Gnwrisa tous kokkinous frourous [I met the red guards]. 72 Meeting with I. Kitsiki even managed to organize trips to China and played a very significant role as a source of Chinese publications that was used for translations. Augi. The series was called Pos na gnorisoume kalitera tin Kina [How to know China better].
2 The first Greek M-L Publishing House In 196377 we see the establishment of the first Greek m-l publishing house. among them was New Democracy of Mao Zedong.78 It was there that the first thoughts of what to be done led to Istorikes Ekdoseis.established. The book itself did not necessarily make a stand against revisionism but the fact alone it was about China was enough to make an antirevisionist statement. etc. Ideodromio. 78 According to I. 77 Many incorrectly place the establishment of Istorikes Ekdoseis in 1964 e. The Greek-Soviet League provided the Russian edition that was used for the translation. especially known for his avant-guard graphic design of subversive magazines like Panderma. Christakis who died earlier this year was one of the best known publishers of the Antiauthoritarian and Anarchist movement in the 70s. I am aware of. It is ironic that the material for the first Marxist-Leninist publication after the revisionist turn in the Soviet Union (1956). It was not possible to acquire the whole series of books in order to make an extensive research. was provided by revisionists. The book was originally published by the Chinese Ministry of Higher Education in 1958 and was translated a year later by the Foreign Literature editions in Moscow. which was published in 1964 so they identify the two as more or less synchronously. Iordanides the leadership in Ai Stratis had some books hidden.some were surely related to the League. edited by Ho Kan-Chi. This is because the landmark of the M-L movement is the monthly periodical Anagennisi.g. Leonidas Christakis had designed the covers of many if not all76 titles of this series. old acquaintances from Ai Stratis where they conducted together the struggle against revisionism. This attempt started by a core of people gathered by Yiannis Hontzeas and Isaac Iordanides. 7. The first book published by Istorikes Ekdoseis was Istoria tes Sygchrones Kinezikes Epanastasis [A History of the Contemporary Chinese Revolution].N. which after some time were distributed and read by the rest of the exiles. Istorikes Ekdoseis [Historical Editions]. 200. (Information provided by Iordanides 42 76 . G. who selected the works to be translated along with the publisher. Feksi has closed down decades ago and there is not archive. It was translated from Russian and the translator although not mentioned is Isaac Iordanides. where a complete list of its titles can be found. At that period it was not possible to find any books on China since there was no direct contact with China. Alexatos. p. Istoriko Lexiko tou Ergatikou Kinematos.
EDA. In the future and although Istorikes Ekdoseis published two volumes of the works of Mao in the same time they published the key documents of Mao in pamphlets in order to create a balance. a lot of money to publish it and it was expensive to buy as well. since at a time when an average monthly wage was around 800 drachmas. was trying to prevent its members from coming in touch with the m-l ideas as they were expressed by Mao Zedong and the Chinese Communist Party and used all means in order to succeed. On the other hand the “official” Left. By publishing a Chinese title the publishers. In their future publishing activity they mainly published pamphlets that were much cheaper and which their reading audience could afford. This publication was not only important because it made the split official but also because the establishment of Istorikes Ekdoseis worked as a centre for gathering The use of quotation marks is due to the fact that the group of people around I. Iordanides translated a few entries for the World Soviet Encyclopedia of Kypseli publishing house and Hontzeas edited a couple of books for a publishing house. Isaac Iordanides and Yiannis Hontzeas. In this way those interested could buy the pamphlets until they could afford the volumes. of which they were members.This was a leather-bound volume so the edition cost the “publishers”79.80 This was probably done due to their lack of experience of the publishing industry being non-professionals. 19 June 2009. (Information provided by Iordanides. its price was 180. 80 Price lists and catalogues appeared in the back and the inner back of the periodical Anagennisi. Iordanides and Yiannis Hotzeas who were the heart and soul of this publishing activity weren’t actual publishers but political subjects who treated publishing as a political action and not as a trade. 19 June 2009). both well-known Marxists-Leninists. 43 79 . published from 1964-67. On one hand there weren’t any bilateral relationships between Greece and China. There only prior involvement with publishing was that I. 81 All this information on the first steps of Istorikes Ekdoseis were provided by Isaac Iordanides co-founder of the publishing house in Drapetsona-Athens. made the split with the revisionist EDA. It was not easy at the time to get your hands on books from China.81 The inexperience of Iordanides and Hontzeas is even more obvious if we compare their practice with the one by Morfosi which exactly in order to avoid such financial problems (cost of publishing) and by taking into consideration the purchasing power of the M-L reading audience chose instalments instead of single volumes.
Istorikes Ekdoseis was created in order to create a centre for mainly MarxistsLeninists former exiles and prisoners such as those that fought against revisionism while in the exile of Ai Stratis. this book was the reason for Beata Kitsiki and Istorikes Ekdoseis cooperation. Kitsiki was looking for someone else to publish the Chinese documents. It was the same time the Chinese and the Soviets were close to the split. 83 All of them are known intellectuals and translators. The first accumulation of Marxist-Leninists led them into publishing the monthly periodical Anagennisi. 44 82 . M-L groups since it was not easy to achieve desirable distribution did this. The group of Marxists-Leninists that established Istorikes Ekdoseis on the other hand would be more than glad to get access to these documents let alone to publish them.and organizing Greek Marxists-Leninists. Probably because Feksi was not a politically orientated publishing house but mainly into literature. It is one of the few cases if not the only one that professionals worked in m-l publishing and that is due to the cooperation with the League of Friends of “New China”. In this publishing cooperation apart from the documents the League of the friends of “New China” provided translators as well. This was in order to expand their influence and It was quite usual at the time and even up to today in Greece for publishers owning bookstores as well. The choice of titles to publish was also made not for profit but in order to serve the M-L cause and also the agents of this publishing house of it became such to serve this cause. as translators of publications of Istorikes Ekdoseis weren’t affiliated with Istorikes Ekdoseis but with the League of Friends of “New China”. One of the bookstores they went was Feksi. This is the reason that after a while Istorikes Ekdoseis moved to a bigger office where there was a hall used for the discussions of the people that became part of this M-L nucleus around Istorikes Ekdoseis. They now had with them Aristeidis Tsampazis who they also knew from Ai Stratis and who worked as door-to-door book salesman and had a small office next to the first office of Istorikes Ekdoseis.82 Feksi contacted Kitsiki since they knew from their cooperation that she would be interested in this new publishing house. especially after Metapolitefsi. For example Mina Zografou and Elli Lambride and Elli Alexiou83 that appears. After the book was ready for sale the people of Istorikes Ekdoseis went to the bookstores in order to get some orders. Apart from that.
And it will meet their most energetic support. It is the natural ending.become known to a wider audience and especially the youth that was radicalized but disappointed by the official politics of EDA. their own concerns. hard but beautiful struggle for people’s liberation. the need to attain a public stand to promote and popularize a series of great issues of authority that have to do with the orientation of the movement. Apopseis kai sxolia. of a hard ideological struggle of the Left that had been taking place for many years. The enemies of truth. Anagennisi was a monthly periodical that together with Istorikes Ekdoseis had been the political expression of the first Greek m-l group. The first issue of Anagennisi went out in October 1964 and 29 issues had been published in total. all of those who fought with passion and faith and persist until today to fight the big. p. Anagennisi published articles of its member’s anonymously as well as Chinese and Albanian translation. Anagennisi initiated the struggle against revisionist EDA and other smaller political groups. democracy and social advancement against opportunism and the policy of submission. will find in Anagennisi their voice. 1. Anagennisi makes its appearance in very difficult and complicated circumstances. A short article in the first issue consists of a summary of what it stands as well as the reasons that led to this publication:84 Publishing Anagennisi is not a result of a sudden inspiration. their Kataliksi mazi kai afetiria [Ending and beginning together]. the intensity and [political] direction of the struggles of the Greek people in order for the country to get rid of the suffocating embrace of foreign imperialism. no. 5. the disseminators of lies and defamation will lay themselves out to strike Anagennisi. And it will have to face every kind of additional obstacles and difficulties… But Anagennisi will be the true voice of truth. For a long time it has became consciousness of the vast mass of militants and followers of the Left in our country. There is no doubt that Anagennisi shall find warm popularity among the vast mass of the Left’s militants and the Greek people. for peace and national independence. All of those who really love the people and the truth. 45 84 . Anagennisi. And the truth doesn’t count this difficulties nor it wears down by them. October 1964. But their best strike is too weak.
From 1978 until 1981 Istorikes Ekdoseis published. After the disintegration of the CPG (m-l) in 1981 a group held Istorikes Ekdoseis . opportunism etc appear often. the autobiography of Polydoros Danielides. Lenin. One of the characteristics of leftist publishing fields. imperialism. Stalin. The third paragraph makes a political stand by sketching the main political principles of Anagennisi and preparing its members and followers for the slander and war they were going to face from the revisionists of EDA if they choose to align with Anagennisi. 46 85 . a number of works of Dario Fo and had planned to publish more. socialism and communism along with revisionism. The first two paragraphs summarize in a coded way85 the struggle between Marxists-Leninists and revisionists. A language code that is very much in common among leftists but is not that ordinary for anyone else. After the crisis in the international Marxist-Leninist movement due to the revisionist turn in China (1976) and Hoxhas’s change of stance towards Mao Zedong it is noticeable that the place that up to then was taken by Chinese and Albanian publications is taken by issues that was up to then subordinated such as culture. Istorikes Ekdoseis restarted activities in 1974 and until 1976 it was the publishing house of OMLE (Organization of MarxistsLeninists of Greece) and from 1976 until 1981 of the Communist Party of Greece (marxist-leninist). Anagennisi and Istorikes Ekdoseis suspended their publications in 1967 due to the Junta since the people working on them were either arrested or exiled or went underground and some left the country. for the first time in Greece. And will stand by its side for sure. along with the words revolution. Where the names of Marx. either it is the MarxistLeninist. The group of people around Istorikes Ekdoseis and Anagennisi. the revisionist or any other is speaking in codes. in 1990. got to know each other in this struggle and decided to do something. something that eventually didn’t happen due to the crisis and the disintegration of the Communist Party of Greece (marxist-leninist) and consequently of Istorikes Ekdoseis. “O Polydoros Thimatai”.but mainly as a bookstore and not a publishing house – with the exception of a very important publication. This was to establish m-l publications as a first step. Mao and others. Anagennisi will move forward opening the way for the real renaissance of the left movement and of Greece.own hopes and expectations. capitalism. Dissolving the darkness that imperialism wants to preserve. breaking all barriers and obstacles.
the publishing house Istorikes Ekdoseis published a little pamphlet entitled: E Laiki Kina gia to Kypriako [People’s China on the Cyprus Question]. pp 5-6. October 1964. which in this specific case was probably more intense and had a more severe effect than the state censorship aspect. 87 Agonistike Synepeia kai Dimosiografiki Entimotita [Militant Consistency and Journalistic Honesty]. in 1974. Eleutherotypia. Both of them were abolished after the collapse of the Junta.88 The advertisement was published the first day IOS. This was the “censorship” on behalf of the revisionists.86 But there is also another aspect of censorship. That was also because while the first had an impact on the publisher’s side. To ideogramma tou taksidioti: H Kina me ta matia ton Ellenon episkepton [Traveler’s ideogram: China through the eyes of Greek visitors]. 20/07/2009.7. The following report from Anagennisi’s first issue is characteristic of this war:87 A few months back. EDA. Tasos Bournas.2. Even when censorship appeared to be inactive.1 Censorship and “Censorship” Anticommunist laws such as the Law 509/47 constituted state censorship as well as Legislation Decree 4234/62.g. EDA directly or indirectly controlled the leftist press of the time in Greece. by using the law 509/47. 1967-71 various censorship mechanisms were in use. this one had an impact both on the publisher – which was expected and the publisher’s team was ready for it – but also on the audience. autocensorship had to take place from the publisher’s side if they didn’t want to get arrested. an editor. Anagennisi. 88 Demokratike Allagi [Democratic Change] was an afternoon newspaper of the left affiliated with EDA. Apart from that in various periods e. was court-martialed because of the publication of a book by Mao Zedong on the Chinese civil war. Ten years before the establishment of Anagennisi and nine before the establishment of Istorikes Ekdoseis. […] The interested publishing house in its attempt to advertise this publication – which consists of a contribution to the cause of liberating the people of Cyprus addressed Demokratike Allagi. 47 86 . So with the appearance of Anagennisi we have a war by using all means from EDA’s side. 1. no.
Unity was one of the bigger blackmails and accusations within the International Communist Movement. But the attack on the reader’s side was unprecedented. Members of EDA were forbidden to read Anagennisi or publications of Istorikes Ekdoseis.91 We leave our readers to draw their own conclusions! Refusal of advertisements.but not the second. false accusations and distorting the viewpoints of Anagannisi by EDA was one side of the story. There was even an issue about “wrongly” publishing it in the first place! We will not deal with the whole disgraceful story of the attitude of the press organs of EDA which came to the point to deny publishing any adverticement of classic documents coming from People’s China by stating: “Never Mao Zedong. 90 Bourgeois newspaper. But the orders were clear: Not even an advertisement should be published on the fact that People’s China have views on the Cyprus question. And the attack that they have delivered against this pamphlet is the best proof for the response it had. Because so we want” especially at a time that so many speeches are made and tears are spilled about “unity”89. What annoys us is the unprecedented action of attempting to obstruct the view of a great country. 48 89 . in People’s China and towards the classic works of a great representative of the vanguard theory. in order to attack and project as People’s China line whatever comes handy. And while this was and still is the stand of EDA’s leadership and of its press organs towards the Cyprus question. Revisionists accused m-l of being fractionists despite the fact that it was they that changed the political line of the International Communist Movement. it has a completely different stand in advertising and projecting in headlines readings like: RUSSIA AFTER THE DESTALINIZATION by Acropolis90 or of scab anouncements of Nea GSEE. Basic journalistic honesty – in order not to ask them for militant consistency – calls for themselves to promote these views that consist of important contribution to the struggle of liberating the people of Cyprus from the imperialist bonds. a more or less expected one. They were expelled for reading. which is a warm support of the struggle of the people of Cyprus. 91 A trade union closely related to the state and the employers. But the truth cannot be hidden in the end.
From 1963 until 1965 students of EDA published it and then it became the organ of P. 7.94 Students affiliated with the Left used to publish student magazines either concerning a specific department of faculty (e.S.P.95 – the student organization established by students affiliated with Anagennisi – in May 1966. Of course Anagennisi from the very first issue dedicated a number of articles concerning the youth and student movement and the need for organizing the students’ anti-imperialist camp. no. an m-l group that at the same time ran a periodical and a publishing house – were facing a constant attempt by EDA’s leadership to completely isolate them. 95 P.P. Anagennisi.2. p.93 More than 100 youth members and cadres left EDA due to this situation and aligned with Anagennisi.P. The former members of EDA that established P. no. no. 25. magazine of the students of the Polytechnic Institute) or for general student issues.g.2 EDA Youth and ‘Anagennisi’ This antidemocratic stand of EDA. The people that belonged to the political group of Anagennisi – because in reality that was what they really were. Anagennisi. The first student union of Greece. 7-8. up to then in the universities you could only find youths of political parties. had been leading members of EDA’s youth and they were very much involved in For such detailed cases see: “Sotires” kai “Ananeotes” [“Saviors” and “Renewers”]. Anagennisi. pp 195201. E oportounistike igesia tis EDA antimetopizei me “diagrafes” tous synepeis agonistes-meli kai stelechi tis EDA [The opportunist leadership of EDA faces the consistent militants members and cadres of EDA with “expels”]. 94 Due to anticommunist legislation they couldn’t use phraseology such as MarxistLeninist camp so they used consistent and anti-imperialist instead.P.92 People that up to then had been their friends or comrades stopped talking to them. Athens 1984. 3-4.S. 2. 93 K. [Proodeutiki Panspoudastiki Syndikalistiki Parataksi / Progressive AllStudents Syndicalist Union]. One of those magazines was the monthly review Spoudastikos Kosmos [Student’s World] published in Thessaloniki. November 1964.P. Lambrakides: Istoria mias genias. Polytypo.S. 49 92 . as well as the unilateral presentation of the Soviet side in the Sino-Soviet polemics among other issues created a bad impression in EDA’s youth members. April-May 1965. pp 24-30. St Martin.P. November-December 1964. pp 60-66 and Oi agonistes katagelloun ten oportounistiki politiki tis igesias tis EDA kai diachorizoun ti thesi tous [Militants report the opportunist policy of EDA’s leadership and separate their position].agreeing with or distributing Anagennisi.
P.a review of Spoudastikos Kosmos and an article that unofficially announcing the creation of P.P. This stresses out the need of such publications within the circles of left students.28.98 So we see that the sales of Spoudastikos Kosmos in Athens equals around 25% of the sales of Panspoudastiki despite the fact that: 1) The youth of Anagennisi and later on P. 98 ASKI digital archive Youth and the Left: <http://62.111/neolaia/rec. Lambrakides: Istoria mias genias. ASKI digital archive Youth and the Left: <http://62. 2) Spoudastikos Kosmos had to deal with the war and blackmails on behalf of EDA which made it difficult for someone to buy the magazine.Spoudastikos Kosmos.S.asp?id=69519&nofoto=0> (08/07/2009). 97 96 50 . In Anagennisi.P. According to K. Salpisma [Call] then replaced it until 1981 when Salpisma suspended its publication since P.111/neolaia/rec. didn’t have an equivalent distribution network as EDA nor the number of members of EDA. in the ideological arena were translated in equivalent dynamics in the publishing field. 198.P. sold between 550-650 copies in Athens.P. Spoudastikos Kosmos stopped its circulation in 1967 and then it restarted in 1974 and until 1976.S.P.96 But Spoudastikos Kosmos first issues – in early 1966 . p. 3) Spoudastikos Kosmos had no financial support and its editorial committee was proud for being the only independent student magazine.after becoming affiliated and then an organ of P. In the case of m-l publishing this is one of the few cases we have data on the sales of any of the periodicals or other printed material especially from the first period (before the Junta of 1967) of this movement. St Martin only about 50 students left EDA for Anagennisi.asp?id=68226> (08/07/2009).P.S.S. St Martin. was dissolved as a result of CPG (m-l) disintegration. EDA youth’s equivalent of Spoudastikos Kosmos had an estimation of selling around 2000-3000 copies in Athens during the period 1964-1965.P. since the existence of a reading audience is vital for any publishing field.97 Panspoudastiki [All-Students]. This has to do with the fact that there was an ideological conflict in which progressive students had to choose sides. K.28.103. It is interesting to see the impact of these ideas in the student movement through the sales of Anagennisi.103. The dynamics created in the field of politics. issue 19 of April 1966 two articles can be found on this issue .
[…] The article continues with an analysis of the m-l viewpoints on the national and international level. On the 28th of January the weekly newspaper Laikos Dromos [Peoples Way] was published.7. There was the need to make a more permanent and regular presence in a way. The dynamics created each time due to the political and organizational advancements of the m-l movement can be translated into making specific actions or steps forward. It comes from the roads opened in October 1964 by Anagennisi and represents this direct continuity and further development of the struggle engaged by Anagennisi. On the 1st of April SPAK [Synepis Politiki Aristeri Kinisi / Consistent Political Left Movement] was established. Its front-page main article states the following:99 Where does the Left go? At the bastion of the people’s struggle stands today a new.2. Publishing Anagennisi was such a step forward. Its subheading was Weekly newspaper at the service of the Consistent Left. published before the Junta apart from a case of bad quality photocopies. SPAK was a legal political group that was created as an umbrella It was not possible to find the 12 issues of Laikos Dromos. fiery and decisive fighter. A monthly review – that often became bimonthly – could not serve the cause of an expanding m-l group.php?name=News&file=article&sid= 1527> (08/07/2009). Anagennisi was a step forward from Istorikes Ekdoseis but now it wasn’t enough.politikokafeneio. since it liberated forces from revisionism giving a boost to the m-l movement and thus creating even greater potentials that had to be expressed somehow. What is Laikos Dromos? How was it born? What are its causes? Laikos Dromos is the child of the antiimperialist and antirevisionist storm. This became even more intense when Anagennisi made some steps forward in unionism such as in universities in 1966. The front-page article can be found in: <http://www.com/neo/modules. 51 99 . Laikos Dromos. its differences from EDA etc.3 How to advance In 1965 a discussion within the leading organ of Anagennisi began on what the next step should be.
4 Non-professionals as agents of the field 100 <http://marx2mao. by means of generalized and systematic agitation that can only be conducted with the aid of the periodical press. It only lasted 3 weeks since on the 21st of April the Colonels coup d’ état took place. should be the founding of an All-Russian political newspaper. and extend that organization. the first step towards creating the desired organization.com/Lenin/WTB01. It is considered that through the newspaper it is possible to reach and create relations with the working class. Anagennisi. when interest in politics and in questions of socialism has been aroused among the broadest strata of the population. Most of the groups use the article Where to Begin by Lenin written in 1901 from which I quote the piece that shows better the concept of the Marxists-Leninists groups towards the press: In our opinion. which is the chief and permanent task of Social-Democracy in general and. It may be said without exaggeration that the frequency and regularity with which a newspaper is printed (and distributed) can serve as a precise criterion of how well this cardinal and most essential sector of our militant activities is built up.organization for those affiliated with Istorikes Ekdoseis.html> (09/09/2009). all-round propaganda and agitation. let us say.100 At their peak (during the ‘70s) the largest Marxist-Leninist groups were able to publish weekly newspapers. in particular. without it we cannot conduct that systematic. would enable us steadily to develop. Publishing a newspaper is considered the highest state of publishing activity at least for the communist press. or. the starting-point of our activities. the pressing task of the moment. deepen. but none was ever able to publish a daily newspaper. 52 . pamphlets.. consistent in principle. the main thread which. Today biweekly Marxist-Leninist newspapers are still being published in Greece. A newspaper is what we most of all need. local leaflets. PPSP and Laikos Dromos. if followed. Never has the need been felt so acutely as today for reinforcing dispersed agitation in the form of individual action. 7. etc.2.
had been in the publishing industry before the establishment of Anagennisi and Istorikes Ekdoseis. Iordanides learned French during his exile in Ai Stratis when various intellectuals decided to organize groups for those interested This goes for the Marxist-Leninist publishing field as a whole. that is for the publishing houses of the main Marxist-Leninist groups in Greece plus some other activities of smaller groups some of which were just publications. mainly translating from English. which they then served.102 The following makes the fact it was really a network of non-professionals that joined forces due to their political and ideological agreement in order to transform it into publishing even clearer. Papaioannou and others appear as translators. co-founders of Istorikes Ekdoseis. both translated from French and Iordanides translated from Russian as well. did not continue working in the publishing field. Apart from some agents mainly from the Metapolitefsi (after 1974) period of this movement which were mainly sympathizers than members of Marxist-Leninist organizations I rarely identified any of the names of those involved in M-L publishing as active publishing agents outside it such as in trade publishing.Neither Hotzeas nor Iordanides. They used their knowledge in foreign languages.2 53 101 . was the reason they undertook publishing activity. This was done especially in the first steps of M-L publishing before Junta. and in particular Marxism-Leninism. They either took some courses during their secondary education or especially from Junta onwards when Greek Marxists-Leninists organized groups in Europe103 they used the knowledge of the language of the country the lived or studied. They became part of the Marxist-Leninist nucleus that established Istorikes Ekdoseis and this political participation was translated into publishing activity. Most of the people whose names appear as translators hadn’t studied foreign languages in the university. 102 I did this mainly by searching the databases of the National Book Centre of Greece (EKEBI) and the National Library of Greece.3. Those who left the m-l movement and that had been in the publishing house Istorikes Ekdoseis. C. The names of R. Politics. Economou. 103 See section 7.101 Publishing was part of their political contribution to the Marxist-Leninist cause. They as well weren’t agents of the publishing industry before. They were in politics though.
meaning that its only aids were income from sales and subscriptions plus donations of supporters. M-L groups. proudly announced to its readers that it was the only independent magazine. which owned the M-L publishing houses. and most of the times there is no payment. 7. it’s mainly volunteer work. do not appear names of translators at all or mention that a committee translated the work. 105 More details on these two groups in Section 7.104 Quite often.3 54 104 . (Thessaloniki. The names of the agents play no significance either for the readers or for the publishing field as a whole. did not have knowledge of French. This applies for all Marxist-Leninist publications and of course for the C. One can suppose that if this is true he translated by using existing translations such as those of Morfosi and with the help of his comrades in a collective way in combination with his knowledge of communist ideology and politics.3. The use of non-professionals as agents is also related with the issue of financial autonomy that will be analyzed later on. The translations were done in a sort of collective way. just a cog in the machine.g.2.5 Financial Independence of the Marxist-Leninist Publishing Field As it was previously mentioned the editorial committee of Spoudastikos Kosmos. It’s the publishing house itself that gives the prestige or the name of the author of the work (e.2-7.3. had as only financial resources membership fees. 8 June 2009). Papaioannou who was a member of Istorikes Ekdoseis before the Junta mentioned that Hontzeas that appears as the main translator of Istorikes Ekdoseis. Mao Zedong). They do not provide their services for financial reasons. learned Italian. contributions of their supporters and the sales of their publications. from French. All the translating team tried to contribute with their knowledge to the effort of the main translator of each work. Agents are considered as soldiers in the service of the cause.where they taught them accordingly to their profession before being exiled. The use of professionals would increase the operating cost of the publishing house in such an extent that it would not be possible for it to function or would have to limit its publications. especially in the publishing houses of the Revolutionary Communist Movement of Greece (EKKE) and the Marxist-Leninist Communist Party of Greece (M-L KKE)105. Iordanides later on while exiled in the island of Leros. in Partheni.
On the 21st of April after the coup the army confiscates EDA’s newspaper Avgi. He organized a group of Marxists-Leninists that announced the establishment of OMLE.3 M-L publications during the Junta Anagennisi and the other m-l publications were the only ones that warned of the danger of a coup while the revisionists did the opposite. After the Junta a lot of the members of SPAK were arrested. One of the two leaders.Marxist-Leninist organizations as well which even when are allowed some state funding they refuse to take it as a sign of their political independency from the state and their refusal of advertisements is used as a sign of being based on their own forces and independency from economic interests. So we have two incidents that would have been quite funny if they weren’t so tragic. periodicals etc as part of that tradition of independence from bourgeois and other political and economical interests. Iordanides was arrested during the first few days and sent to exile in the island of Leros. It was titled Gramma apo ten Ellada [Letter from Greece]. for writing that there was going to be a Junta in Greece by using the anticommunist laws and with the excuse that they were trying to create turmoil among the people. A small nucleus of people stayed in Greece in order to organize the anti-junta struggle and the rest were sent abroad to organize the work there and to be called back if necessary after some steps were made. Hontzeas escaped and went underground. In a case that a group or publication accepts such funding or advertisements. The M-L publications in Greece even today do not use advertisements in their newspapers. On the other hand the editorial committee of Spoudastikos Kosmos was trialed and convicted by the Junta.1 M-L publishing in Greece during the Junta 55 . 7. One of the key articles is why there is not going to be a Junta in Greece. In August 1967 the leadership of OMLE sent a political document describing some basic political positions on Greek and international issues abroad.3. it would be considered as a political setback and would be strongly criticized by other groups. 7. We can say that this was the platform on which the m-l organizations and publications were based.
mainly newspapers and magazines. no. OMLE in 1968 established AME [Agonistiko Metopo Elladas / Militant Front of Greece] but there is no evidence of it having any publications.gr/index. 7. 1973: Epanastatiko Ergatiko Apeleutherotiko Metopo [Revolutionary Workers Liberation Front] by Kostas Bakirtzis. Unfortunately no evidence of publishing activity exists. First it issued a bulletin using a polygraph. Later on OMLE sets up an underground press and in November 1968 the clandestine newspaper Proletariake Simea [Proletariat’s Flag] is published in a small size.3. 1. Istoriko Lexiko tou Ellenikou Ergatikou Kinematos. Alexatos.koel. or even splinter actions of members of the new leadership .2 M-L publishing abroad <http://www. After the arrest of the leading team of OMLE and due to problems of continuing the work initiated in the period 1967-1969.due to dissapointment by the actions of the new leadership. published Neoi Agones [New Struggles]. 1972-73: Laike Eksousia [People’s Power] led by Kostas Zirinis published the Bulletin of the organization of marxists-leninists Laike ‘Eksousia’. Kritiki – Syspeirosi. pp 30-32 and G.in chronological order are:107 1970: Marxistiki Leninisti Kinisi Elladas [Marxist Leninist Movement of Greece] and Popular Democratic Front of Greece established in 1970 both established by Manolis Piblis and published Pleroforiako Deltio of MLKE [Information Bulettin of MLKE] and Epanastatike Fone [Revolutionary Voice] respectively.106 Proletariake Simea was sent abroad since its articles have been reproduced in publications abroad.were created and they published their own material. OMLE initiated its publishing activity.php?option=com_content&task=view&id=584&Itemid =83> (08/07/2009).N.After its establishment.mainly active in Greece . 56 106 . 1974: Kinese Ellenwn Marxiston Leniniston [Movement of Greek Marxists Leninists] led by Nikos Raptes. Some examples of such groups . 107 Most of this information comes from Kritiki istoriki anadromi sto marxistiko – leninistiko kinema tis Elladas [Critical historical retrospect to the Marxist – Leninist movement of Greece]. In 1969 the key members of OMLE were caught and the Junta discovered the printing press. April 1975. other smaller groups mainly splinters from OMLE .
establishment of student unions and Greek communities which were the places were the struggle between revisionists and m-l took place and as a result a lot more publications to serve the struggle between the various groups. 182. OEML published the monthly newspaper Laike Fone [People’s Voice] between 1971-1974. in Germany. The various branches of AMEE in western European countries published monthly Information Bulletins i.e. and also leaflet and flyers on various issues. they were not forced to work underground. In late 1974 it changed its name to Communist Party of Greece / MarxistsLeninists an in 1975 it underwent a split.Greek Marxist-Leninist groups abroad could work under better conditions during the military Junta (1967-1974) than their comrades in Greece. Italy named Laike Enoteta [People’s Unity]. Kokkini Simea [Red Flag] an also monthly review that was considered as its central theoretical organ. Members of SPAK. An additional advance in relation to m-l publishing within Greece during the Junta was the fact of having access to Chinese and Albanian m-l documents as well. Oi organoseis tis eksokoinovouleutikes aristeras sten Ellada ten periodo 1956-1981. This is because despite some disturbance by the Junta through Greek Embassy employees etc. That had as a result more intense discussions. Documents. 13. which soon became OMLE.109 OMLE published a monthly review called Laikos Dromos as was the name of the newspaper of SPAK before Junta and also published pamphlets from time to time under the name Laikos Dromos as well. the periodical Protoporia [Vanguard] which was its monthly theoretical organ. In Germany the AMEE branch led by a Giannis Zachos who was expelled in 1968 splintered and Zachos created OEML [Organization of Greek MarxistsLeninists]. 109 109 108 57 . Czechoslovakia and Canada. G. which was a periodical edition in English. One of the two splinter groups that kept the same name had to change the name of its periodical to Kokkino Asteri [Red Star] since the other was able to keep Kokkini Simea. In 1972 it started publishing a monthly newspaper in Modena. According to Giannakopoulos OMLE owned presses in Modena. Giannakopoulos. abroad created AMEE108. After OMLE the second most significant group was EKKE [Epanastatiko Kommounistiko Kinema Elladas / Revolutionary Communist Party of Greece] See p. p.
g. In Canada we have the creation of two M-L groups of Greek immigrants in Toronto and Montreal that didn’t have any relationships with the groups back in Greece at first and didn’t even know their existence. 23 July 2009. It set up EKKE publications and in 1972 published series of pamphlets on the history of the international labor movement. 7. Some issues were illegally sent to Greece as well. In Ringwood. the history of the Communist Party of China etc. Australia a group called Organization of Greek Marxists Leninists of Australia published the monthly newspaper Neos Agonistes [New Militant] from 1968. There had been other smaller groups such as AKE (Antifascist Movement of Greece) that published the monthly periodical Antifasistas [Antifascist] in 1970 and published some pamphlets of Mao under the same name. Iordanides in Drapetsona-Greece. e. The issues that were confiscated during the Junta by the police were somehow channeled back into the market in Monasteraki.3 From ‘Metapolitefsi’ to Social-democracy 110 Meeting with I. with bourgeois forces or even King Constantine as some revisionist forces of the time suggested in their publications and which the m-l groups rejected and fought against in theirs.founded in Germany in 1970. EKKE published Communistis as its monthly organ. Now it was the anti-junta struggle the leading driving force for m-l publications. These series were translated from German. The group in Toronto published the monthly newspaper Synepis Pale [Consistent Struggle] while the group in Montreal published the monthly newspaper Protoporos. 58 . Athens most known flea market from where they bought them and later on joined the group.3. on the history of the Communist Party (Bolsheviks) of the Soviet Union. Of course the antirevisionist struggle did not cease especially as the antijunta struggle advanced and thus a struggle among the various anti-junta organizations developed on the directions and the character of this struggle and the alliances that would serve an anti-junta front. The significance of the press for the Marxist-Leninist movement is stressed out by the fact that according to Iordanides110 a number of young people during the Junta find out about Marxism-Leninism and especially with the group that was then named Organization of Marxists-Leninists of Greece through Anagennisi.
114 This was more of an issue of making a critical assessment of the history of the Communist Party of Greece or not than an issue concerning Zachariades.During the Junta we see the creation of a lot of m-l groups and publications. ‘From “Anagennisi” to the crisis of the post-maoist era: The M-L current in Greece during the decates 1960-1970’. Ektos Grammis. In many cases the term of m-l publications is more correct than m-l groups since these groups of people consist primarily of a publication than of a group.114 These issues created respective dynamics that gave boost to m-l publications once again. 116 Belonging to M-L CPG. And of course the antirevisionist issue which was a permanent topic of ml publications. The rest of OMLE simultaneously created CPG (m-l). Ekdoseis EKKE and Na Ypiretoume to Lao [To serve the people] and also published the newspaper Laikoi Agones. a splinter group from OMLE in 1976. 23. 115 EKKE used to publications brand. As G. G. peoplesdemocratic or socialist)113 and to the support or not of the policy of Nikos Zachariades as the leader of the historical Communist Party of Greece. which has been the reason for a great split among the m-l movement while Istorikes Ekdoseis don’t. 59 111 . The issue was whether the Greek m-l movement can and should stand on its own two feet or it can’t and thus it should create and keep relations with China or Albania in a relation known as Big brother – Little brother with the latter being the Greek m-l movement and the Big brother being China or Albania. p. what will be the character of the revolution in Greece (bourgeois-democratic. 112 The issue is stated in a quite simplistic manner by the author. M-L CPG kept the title of the newspaper Laikos Dromos and CPF (m-l) started publishing Proleteriaki Simea that was also published during the Junta as an underground newspaper. 59. Alexatos states in his article on the m-l current in Greece during the decades 1960-1970 the differences between those groups had to do with the following:111 […] full or critical support of the Chinese foreign policy112. So we have Ekdoseis EKKE115 and Morfotikes Ekdoseis116 that remained proChinese after Mao’s death continuing publishing Chinese works such as the Three Worlds Theory. no. May 2009. Alexatos. 113 This was related to the analysis of the character of the Greek society and economy each group made. The most important publication made by m-l publishing house apart from Istorikes Ekdoseis was the fifth volume of Mao’s Selected Works by EKKE publications and Morfotikes Ekdoseis.
Today only some titles found in the remainders and second-hand bookstores reminds us of the existence of the Greek Marxist-Leninist publishing field that for almost two decades had a prominent position within Greek leftist publications.g. informed me that back then M-L publications sold like 60 117 .The time from the mid to late 70s was a time of crisis for the m-l movement. Apart from that we have the rise of PASOK. bookstores either closed down immediately. Publishing houses closed down. translators. which meant confidence to the m-l cause led them dissolving their groups and either stopping any political activity or joining the new rising political party. using slogans of the Left. Most of the groups’ leaders didn’t have faith to their own strength. This led to the disintegration of the Marxist-Leninist publishing field in Greece. When nobody else in the world remained on the m-l side but turned revisionist (in the case of China) or dogmatic (in the case of Albania) they felt all alone against everybody. with bookstores118 It is possible that the reason that in relation with other agents of the Greek M-L publishing field such as translators. It was also promoted by the system as a force of stability since the right-wing party was not able to stay in power for long due to close links between its high-rank members and the Junta it started advancing. The enormous dynamics once being created by the millions of Chinese Marxists-Leninists during the Great Proletariat Cultural Revolution that gave them boost were long gone. PASOK. Due to the fact of the aforementioned lack of confidence to their power. 118 Tasoula Gkenidou. only when it was necessary such as working on a book to be published. PASOK was a Social-Democratic party founded in 1974 and led by Andreas Papandreou. That is the main reason of the crisis. some turned into trade bookstores117 or just survived until they sold their stocks. editors etc. In 1981 it won the National elections. China after Mao stopped being m-l and even the groups that initially supported the new regime that took power in 1976 under Deng XiaoPing soon had second thoughts. It presented itself as a Left party. The issue wasn’t following Albania but in general following somebody. Enver Hoxha denounced Mao’s politics in the late 70s and that created a split in the m-l movement. there were more booksellers staying into the business since they worked mainly full-time while others e. who owned a trade bookstore in her village Evropos in North Greece during the late ‘70s.
translators and booksellers wrote. During that era the M-L struggle against revisionist was intense. It was the international developments that led to the disintegration of this movement as they led to it’s growth. 27 March 2009). dozens of newspapers and periodicals and hundreds of books and pamphlets. crazy. Another reason that the ML movement worked on a volunteer basis was due to the lack of capital on one hand the aim of maintaining financial independence from the State and financial institutions.especially the translators . The leaders of those groups could not carry on the anti-revisionist. within the m-l publishing field had no past and in most cases . (Evropos. This happened during the mid-60s when this movement rose until the mid-70s. Epilogue The Greek Marxist-Leninist publishing field followed the exact course of the Greek and international M-L movement. 61 . without China and Albania. before China’s revisionist turn that pulled the carpet under the international M-L movement’s feet and that was reflected to the M-L publishing activity. Its sperms were carried from the early 50s but it was not until the early 60s that it really started developing as the M-L movement did. They became agents of this temporarily created publishing field because they believed in the M-L ideas. Non-professional journalists. The vast majority of these people. This time frame is what we now reflect upon as the golden era of the M-L movement. 8. so that many times she didn’t wait for the books to arrive from the publisher in Athens but lent them from other bookstores from Thessaloniki. since the leadership in most of these groups believed that there was too much weight to carry alone. translated and sold m-l publications. who became agents. Most if not all of their work had been on a volunteer basis exactly because their work was considered ideological and political rather than a real job. anti-imperialist struggle the M-L movement that was until then conducting. authors.no future within the publishing industry.in Athens and Thessaloniki. which followed a parallel course.
Although from the 80s until present day there is a spell of very limited M-L publications.turned revisionist. which was the anti-revisionist struggle as it was conducted in an international and national level faded away after China – the main force of this struggle .After the disintegration of the M-L movement especially after the end of 1981 when the Social democratic Party. all other publications are sporadic. Some of them after the splits or disintegration of the groups they belonged to. this publishing field diminished. PASOK. The dynamics that created it in the first place. won the elections and “absorbed” or diminished the vast majority of the Greek Left. kept the bookstores until they sold the stock they had and/or turned their bookstores into trade bookstores. Apart from the newspapers which themselves are limited in number in relation to the past. one cannot compare it with the M-L publishing field of the 60s and the 70. but in general they abandoned the M-L publishing field. Publishing houses are no more than brand names used for these sporadic publications every time needed and consequently there is a limited number if any of agents consistently involved in M-L publishing activity 62 .
(Revolutionary Communist Movement of Greece) [Athens Branch] Archive of Isaac Iordanides Archive of Yiannis Hatzis Archive of Vasilis Tomanas Archive of Vasilis Platanos IISH collections of Greek M-L publications from the 60s and 70s (Pleroforiako Deltio tou AMEE Germanias. Digital Archive of Democratic Army of Greece <http://62. Bourdieu. – Burke. in Finkelstein. – McCleery. Laiko Bema... Briggs. 2nd ed.N.2. 63 . D. Polity. Cambridge 2006. Laikoi Agones. second ed. Laikos Dromos. Digital Archive of Greek Youths movements and political organizations <http://62.28. 9. Istoriko Lexiko tou Ellenikou Ergatikou Kinematos (Historical Dictionary of the Greek Labour Movement). Geitonies tou Kosmou. Bibliography 9.. G. A. Stochastis.K.28.103.. The field of cultural production.. Fone tes Neolaias. Books and articles Alexatos. IISH collection of Peking Review Digital Archive: Culture and the left in Greece during the 20th Century < http://62.E. Laiki Enoteta. Ekdotike Drastiriotita kai kinese ton ideon sten Ellada [Publishing Activity and Movement of Ideas in Greece]. Fone tou Laou.. P.. Routledge. New York 2003.111/lsaski/> (29/06/2009). A Social History of the Media. etc).103. L.111/neolaia/> (29/06/2009). The book history reader.28. Athens 2006.111/ds/> (29/06/2009). P. Axelos.K.103. A.1 Archival Material Archive of the Communist Party of Greece (marxist-leninist) [Thessaloniki Branch] Archive of the Communist Party of Greece (marxist-leninist) [Athens Branch] Archive of the Marxist-Leninist Communist Party of Greece [Athens Branch] Archive of E.9. Athens 2008.
The China Quarterly. 1942-1962. Donnithorne. Arthra apo to periodiko ‘Anagennisi’ 1964-1967 [Articles from Anagennisi 1964-1967].. Communist Party of Greece (marxist-leninist). China’s Economic System. London 2008. Athens 2004. Eleutherotypia. New York. Athens 2002. Volume III (2006). Tes Ges oi Kolasmenoi [The Damned of the Earth].. Gia to kommounistiko kinema tis Elladas [For the communist movement of Greece]. ‘The Organization of Publishing in China’. IOS. G. The “8th Nentori” Publishing House. Evgeniades.. A/Synecheia. 20/07/2009. 64 . 205-213. Athens 2005. Athens 2008 Feldman G. Athens. 107 (Sept. The Historical Review. PhD Dissertation.. Cambridge University Press. Lanham 1981. Athens 2002. Communist Party of Greece (marxist-leninist). Athens 1993. B. ‘Literature and National Consciousness of the Greek Minority in Northern Epirus’. fifth ed. Ektimiseis gia ten poreia tou M-L kinematos sto esoteriko kai diethnos [Evaluations for the course of the M-L movement national and international]. 519-529. A. Oi ekselikseis sto Pagkosmio kommounisitko kinema kai e dimiourgia tou marxistikou-leninistikou kinematos sten Ellada [The developments in the international communist movement and the creation of the marxist-leninist movement in Greece]. Poems. N. To ideogramma tou taksidioti: H Kina me ta matia ton Ellenon episkepton [Traveler’s ideogram: China through the eyes of Greek visitors]. Imperialism and the Revolution. Rowman & Littlefield.. issues 179-184.. A. Frantzi. Morfotikes Ekdoseis. 1954. Darberis Tasos. Proletariake Simea. Routledge. E. Athens 1994.. Panteio University.Brugger. No. Masses & Mainstream. pp. Hontzeas Y. Hoxha. Hontzeas Y. pp. Tirana 1979. To “telos” tou kommounismo [The “end” of communism]. Ektos ton Techon. Proletariake Simea.. China. Giannakopoulos.. G. Oi organoseis tis eksokoinovouleutikes aristeras sten Ellada ten periodo 1956-1981 [Organizations of the extra-parliamentary left in Greece during the period 1956-1981].. 1986)... liberation and transformation. Hikmet. Mia istoria tis nyxtas 1967-1974 [A night story 1967-1974]. A/Synecheia. Bibliopelagos. Iordanides I.
.. Thessaloniki 2005 65 . Lambrakides: Istoria mias genias [Lambrakides: History of a generation]. To oplo parapoda: Oi politikoi prosfyges tou ellenikou emfyliou polemou sten Anatolike Europi [Political refugees of the Greek civil war in Eastern Europe]. Polytypo. Bibliorama – ASKI. Athens 2003. O Polydoros Thimatai [Polydoros Remembers]. Proskenio.4. Ekdoseis Panepistimiou Makedonias. April 1975. pp. Provlimatismoi gyro apo gegonota kai prosopa [Examination around facts and persons]. A. E eksoria mesa sten eksoria kai kapoies skoteines plevres tis 6is olomeleias [Political refugees in Transylvania. To oplo parapoda: Oi politikoi prosfyges tou ellenikou emfyliou polemou sten Anatolike Europi [Political refugees of the Greek civil war in Eastern Europe]..Kassimeris. Oi “marxistes-leninistes” politikoi prosfyges sten Anatolike Europi (1964-1974) kai to paranomo deltio “Epanastatis” [“Marxist-Leninist” political refugees in Eastern Europe (1964-1974) and the illegal bulletin Revolutionary].... Stamatopoulos D. 40 (2005). A political and economic dictionary of East Asia. A/Synecheia. G. Ekdoseis Panepistimiou Makedonias. N. in Mpontila M.. D. no. Istorikes Ekdoseis. Koulouris. Routledge. Athens 1983. in Mpontila M. London 2005. 1.. Athens 1994.. – Poleme P. Matthaiou A. Athens 1990. ‘Junta by Another Name? The 1974 Metapolitefsi and the Greek Extra-parliamentary Left’. New York 2005. Kritiki – Syspeirosi. St Martin. Rizakis. 2nd ed. 745-762. McCleery. To elleniko foititiko kinema kai o antidiktatorikos agonas sten Italia [The Greek student movement and the anti-junta struggle in Italy]. Athens 2000. Odoiporiko: Anadromi ste zoe kai drase ton politikon prosfegon [Peregrination: Retrospect to the life and action of political refugees]. Journal of Contemporary History. Thessaloniki 2005. Pares S. Kritiki istoriki anadromi sto marxistiko – leninistiko kinema tis Elladas [Critical historical retrospect to the Marxist – Leninist movement of Greece]. Politikoi Prosfyges sten Transylvania. Kleitsikas. St. Katerina. Athens 2006.. (ed. pp 16-32.). An introduction to book history.). Kepesis N. N.. Polydoros. (ed. Exile within exile and some dark sides of the 6th plenum]. E ekdotike peripeteia ton Ellenon kommouniston: Apo to vouno sten yperoria 1947-1968 [The publishing adventure of the Greek communists 1947-1968]. no.
<http://www. Afieroma sten Kina [Tribute to China]. 84. no. Scarecrow Press. 1. L. Neos Kosmos.cfm?iCntno=341> (14/04/2009). Historical Dictionary of the People’s Republic of China. March 1951.marxists. 571. 9. Oi ekdoseis mas to dimeno Genari-Flevari 1951. <http://www. Second Edition. pp 43-44. 1-15 April 2003.shtml > (14/04/2009). no. 155.3.Sullivan. 28/04/07. 85. Plymouth 2007. (in two parts.htm > (14/04/2009). Enantia sti lithi kai ti synenesi: 40 chronia apo tin amerikanokiniti chunta [Against οblivion and consent: 40 years from the US-backed junta]. Websites < http://www. Anasyntaxi. no. Anagennisi.osaarchivum. pp. 5. 61. To kineziko theatro – E hthesini omilia tou Oi ekdoseis mas sto 1950.org/subject/china/peking-review/index. 44. p.org/PekingReview/index. 10/04/1976).. R. Kataliksi mazi kai afetiria [Ending and beginning together]. Neos Kosmos. issue 9 (third year). 17/04/1976. Apopseis kai sxolia. 24/04/1976.org/files/holdings/300/8/3/text/92-1-251. 86. 2324.massline. 54. 30/04/1976). Ekato chronia apo te gennise tou Nikou Zachariade [A hundred years from the birth of Nikos Zachariades].com. no.flp. Athens. Athens 20/5/1960. 03/04/1976 and no. Laikos Dromos. E Epithesi tou revisionismou ston Ae-Strate [The attack of revisionism in Ai-Stratis]. Oi ekdoseis mas sto dimeno Ioulios-Augoustos. Proletariake Simea. no. issue 1 (third year). September 1951. 82.osaarchivum. Epitheorese Technis [Culture Review]. Neos Kosmos. Augi. January 1951. no. November-December 1956. Laikos Dromos (in three parts.org/files/holdings/300/8/3/text/10-4-7.cn/en/newsdetail. <http://www. October 1964. no. <http://www. E prote kineziki pneumatiki antiprosopeia stin athina [The first Chinese cultural delegation in Athens]. E Epithesi tou revisionismou sten Taskende [The attack of revisionism in Tashkent]. p.htm> (14/04/2009). no.shtml> (14/04/2009). issue 3 (third year). 66 . 83.
<http://www. < http://archive.3863&profile=ebe0 --2&menu=home&submenu=subtab11&ts=1246484596657> (02/07/2009).htm> (07/07/2009). <http://www.102. <http://195.do> (23/06/2009).enet.com/neo/modules. <http://62.org/glossary/frame.gr/ios2008/ios20080720.com/neo/modules.dt=26.html> (09/09/2009).134.php?option=com_content&task=view&id=584&Itemid=8 3> (08/07/2009). <http://62. <http://www. <http://www.2002. <http://www.Σ.111/ds/tree.politikokafeneio.org/wiki/Zëri_i_Popullit> (14/04/2009).iospress.php?name=News&file=article&sid= 1994> (07/07/2009).politikokafeneio.id=56280624> (07/07/2009). <http://www.jsp?session=12Q648453Q798. <http://www.edu/halsall/mod/1956khrushchev-secret1.103.)> (04/08/2009).Ε.wikipedia.45/ipac20/ipac.Σ. <http://62.103.<http://en.Ε.nlg.111/ds/treeres.Σ.103.fantomas.marx2mao.html> (05/07/2009).%20Περιο δικά> (04/08/2009). <http://osaarchivum.com/Lenin/WTB01.asp?mynode=73040&afteroot=~Εκδόσεις%20του%2 0Βουνού%20(Δ.gr/content/index.php?name=News&file=article&sid= 1527> (08/07/2009).28.com> (29/06/2009). <http://marx2mao.28.gr/index.htm> (03/08/2009).asp?mynode=75818&afteroot=%20~~Δ.jsp?id=13321&p=1> (01/07/2009).gr> (07/08/2009). < http://www.gr/history. < http://thesis.ekt.cn/gtweb/enaction.28.103. <http://www.111/ds/tree.asp?mynode=73519&afteroot=%20~~Δ.biblionet. < http://www. 67 . <http://www.greece-china.Ε.111/ds/> (14/04/2009).com.07.28.org/library/periodicals?idx=Countries&id=2> (04/08/2009).koel.html> (04/08/2009).html> (07/07/2009).marxists.fordham.gr/arthrathemata16-17. <http://62.cibtc. <http://www.%20Εφηµε ρίδες> (04/08/2009).gr/online/online_text/c=112.gr> (02/07/2009).
You're Reading a Free Preview
|
__label__1
| 0.802307
|
Mystere pa21 Stereo Tube Power Amplifier
Durob Audio is a company in the Netherlands that markets PrimaLuna tubed audio components, including integrated amplifiers, power amplifiers, and a CD player that has a tube-based clock. It also has a discrete output stage with triodes running in pure Class A. Conventional CD players use op-amps in the output stage. Although the tube output stage and op-amp output stage sound different, one doesn’t necessarily sound “better” than the other, although tubeophiles would all opt for the “better”. We reviewed the PrimaLuna DiaLogue Two integrated amplifier in December, 2009.
With the introduction of Durob Audio’s Mysterè line, we now review the Mysterè pa21, which is a 55 watt per channel stereo tube power amplifier. The Mysterè line goes beyond the PrimaLuna line with larger transformers, more power supply capacitance, and an auto-bias circuit that lets the consumer choose between using KT88’s or EL34’s as the output tubes. Trying different tubes is one of the things that makes tube products fun, and those who participate in this activity are called “tube rollers”.
• Design: Stereo Tube Power Amplifier, Push-Pull, Class AB
• Power Output: 55 Watts x 2 into 8 Ohms
• Tube Compliment: Four 6SN7, Four KT88
• MFR: 9 Hz – 52 kHz, ± 1 dB at 40 Watts Output
• THD+N: 1% at 55 Watts Output
• Input Impedance: 100 kOhms
• Inputs: RCA
• Outputs: Five-way Speaker Binding Posts
• Dimensions: 8″ H x 16.75″ W x 17″ D
• Weight: 60 Pounds
• MSRP: $2,995 USA
• Mystere USA
The Design
The pa21 has two gain stages, with the 6SN7s providing the input stage and the KT88’s at the output stage. You can substitute EL34’s for the KT88’s, and switch the toggle on the side to give the proper bias voltage for the EL34’s vs. the KT88’s.
The KT88, introduced in 1956, is a beam tetrode, and a schematic with pin-outs is shown below. The cathode (Pin 8) is indirectly heated by a filament (Pins 2 and 7, h). The control grid (Pin 5, g1) and screen grid (Pin 4, g2) are between the cathode and anode (Pin 3, a). (© Genalex)
Here is a diagrammatic representation of a beam tetrode. The light green lines represent the “beam” of electrons that flows from the cathode towards the anode in the direction indicated by the arrows.
The EL34 is a pentode rather than a beam tetrode, and was developed by Philips in 1953. The KT88, developed by MO-Valve, could not be an actual pentode, because Philips held the patent. So, the pentode design was modified such that it became a beam tetrode. The first beam tetrode was the 6L6, which is still very popular in guitar amplifiers.
A generic diagram of a pentode is illustrated below. The numbers are not the pin socket numbers, but are just for identifying the structures in the diagram.
It has a cathode (2) which is indirectly heated by a filament (1), three grids (4,5, and 6), and the anode, also called the plate (3). It can be operated as a triode by connecting the grids together.
The 6SN7 is a dual triode, originating in 1939 from the US (the ECC32 is the European version). It was used as the driver stage in audio amplifiers, and is electrically similar to the 12AU7. It is still used quite often, such as in preamplifiers. Here is a schematic with the actual pin-out arrangement, as viewed from the bottom of the tube. Pins 7 and 8 are the heater for the two cathodes (6 and 7), pins 1 and 4 are the two grids, and pins 2 and 5 are the anodes (plates).
So, with the pa21, for each channel, there are two triodes in the input stage and two triodes in the driver stage (each channel has two 6SN7’s and there are two triodes in each tube), and two pentodes in the output stage. The input stage delivers the voltage, and the output stage delivers the current.
The chassis is gloss black enamel, and the cover for the tubes can be removed to aid in dissipating heat. But if you have small children, leave the cover on.
The rear panel has five-way speaker binding posts, with 8 ohm and 4 ohm “taps” (these are connected to different positions on the output transformer). The power on/off toggle is on one side and the KT88/EL34 toggle is on the other side. The AC power cord is grounded and detachable.
In Use
The pa21 had a midrange lushness that I have come to expect. This is due to a tube amp’s natural tendency to produce mostly 2nd order harmonics, which you will see in the bench tests. It produced more distortion overall than a solid state amplifier might, and the argument never ends about why consumers are happy with that higher level of harmonics, even though they are “euphonic”, which means having a “sweet” sound. I am a huge fan of tubes myself, and love the characteristic that the high level of 2nd order harmonics imparts on the sound. The reason for this is that we can never really come up with an audio system that will truly reproduce the sound of a live orchestra in our listening room. It can come close, but no cigar. For a single instrument or a jazz quartet, maybe really close. Still no cigar though.
On the Bench
Distortion measurements were made within an 80 kHz bandwidth. Except where indicated, the load was 8 ohms.
Most of the time, we listen to our audio systems with just a few watts. Here is a 1 kHz sine wave test signal at 5 volts output (the left channel is represented by the yellow lines, and the right channel by red). There is 0.21% THD+N. That would be considered quite a bit in the solid state world. But for tubes, it is the norm. Notice that the 2nd order harmonic predominated.
At 15 volts output, distortion rose to 0.38%, but the 2nd order harmonic was still the biggest one. Again, seeing all those tall peaks makes it look like there is a lot of distortion, but the Y axis is exponential, and this is really just so we can see the peaks more easily.
Compare the above graph to that taken from a solid state balanced push-pull power amplifier, shown below. The total distortion figure is lower by a factor of about 30. All of the even-order distortion products have been cancelled, leaving only odd-order harmonics. The total amount of distortion is about 1/100th of a percent. This is right about at the level of controversy as to whether the distortion can be heard. It’s likely not “heard”, but perhaps “sensed” in some form.
With 60 hz and 7 kHz sine waves, and 5 volts output, IMD measured 0.77%.
At 15 volts output, IMD rose to 1.47%. This appears to be a high number, but it’s often seen in tube components.
For 19 kHz and 20 kHz sine wave test signals, at 5 volts output, the B-A peak at 1 kHz was 52 dB below the fundamentals.
At 15 volts output, B-A was 36 dB below the fundamentals. Looks like a lot of distortion doesn’t it? But don’t critcize until you have listened.
THD+N vs. Frequency indicated less than 1% distortion at output levels up to 15 volts into 8 ohms.
Power output didn’t quite make it to the specified output, but it was close. Because of these curves, I would suggest using the 8 ohm tap regardless of the speaker.
The measured frequency response was 20 Hz – 20 kHz, + 2 dB at 5 volts output. At 15 volts output tended to rise a bit at both the low end and high end.
Tube amplifiers have made their comeback, and if you are a “Retro” kind of person, or just someone looking to go back to a full-bodied tube sound, the Mysterè pa21 is your kind of product. It’s beautiful to look at (the soft glow of the filaments in the evening adds to that peaceful sensation), reasonably priced, and delivers everything you might expect and desire from a tube amplifier.
The amp compares favorably with my reference units, but I play music very loud in many situations and I use speakers that are not very efficient, so I have to use amps with a lot more power, i.e., 1200 watt monoblocks. But the Mysterè has a sound of its own. I found it to be extremely pleasant to listen to in the evening, at low/moderate volume, while I was reading. You know, the glass of wine, fireplace going, cat on my lap kind of evenings. And this is the first June I have lived in California where I needed to use the fireplace. What is it with this weather?
|
__label__1
| 0.514612
|
Scientists discover a new disease-causing bacterium in an immune-compromised patient
Researchers discovered a new bacterium in an immune-compromised patient, according to a study recently published in PLoS Pathogens. The bacterium belongs to the family Acetobacteraceae and includes bacteria common in the environment, some of which are used in industry, such as vinegar-making. "This is the first reported case of invasive human disease caused by any of the Acetobacteraceae," according to the article.
The new bacterium was identified in a patient with chronic granulomatous disease (CGD), a rare genetic disorder that impairs the immune system. In the patient, the bacterium caused fever, lymph node inflammation, and weight loss, but not death.
The journal also published an editorial entitled, "Extending the Spectrum of Human Pathogens," which comments on the significance of the discovery.
Usually, our immune systems fight off most bacteria and fungi with everyday ease, thwarting infection. But patients with CGD cannot control attacks by certain bacteria and fungi. The disorder prevents immune cells called neutrophils from functioning properly, and recurrent --and potentially life-threatening-- infections result.
The team isolated the new bacterium from the patient's swollen lymph nodes and demonstrated its pathogenesis. "Our first concern was to determine whether this organism was truly associated with his clinical syndrome," the team wrote.
Despite ineffective neutrophil immune cells, the patient's immune system still tagged the bacterium as an invader. Researchers also exposed CGD mice to the bacterium, recreating the appearance of the patient's infection. Researchers were then able to retrieve the bacteria from the mice's spleens, which are disease-fighting organs. These factors all support the pathogenic nature of the bacterium.
Because the bacterium does not cause death, it may be provide useful comparison with more menacing bacteria and fungi in CGD patients. "Given its apparent low virulence, further investigation of this organism may shed light on the mechanisms of microbial killing in CGD. Comparing the genome of this organism to other 13 available genomes of CGD pathogens may provide clues to virulence properties that they share in common," according to the article.
The research team, composed of scientists from the National Institutes of Health and Rush Medical College, have proposed Granulobacter bethesdensis as the bacterium's name.
Published on All rights reserved.
|
__label__1
| 0.998336
|
Hawaii Travel pictures of the island of Hawaii - Hawaii Island - a report on Hawaii Islands - tourism in the islands of Hawaii - the most beautiful landscape pictures in the Hawaiian Islands – Hotels and Hostels in the island of Hawaii - Images of Hawaii - Travel to Hawaii - The most beautiful trip to the Hawaiian Islands
Hawaii consisting of six separate islands and of the United States, It is one of the most parts of the world considered as a top destination for tourist. Feature the beauty of nature and unique diversity as well as beautiful mild throughout the year atmosphere.
In Hawaii there are a collection of cheap hotels, hostels and guest house affordable accommodation which work with all travelers budget.
Hawaii islands were formed of a group of volcanoes erupted from the bottom of the ocean. Million tons of lava from the inside of the earth created the surface of those islands. First Island created is Kaui, then Oahu, then Maui and Hawaii.
Due to the difference in the dates of forming of each island, each island nature and the shape is different. The island of Hawaii is the youngest of this group of islands. Where there is the highest peak of Mount volcanic neighborhood and home run tend to extroversion little forest and the trees.
In the Island of Hawaii there is the highest volcanic mountain peak. Its landscape tends to be flat with little of woods and trees.
The oldest islands of Hawaii is Kaui, has nature scenery, heavy woods and very beautiful.
The remaining islands of Hawaii has features can be described as a combination of the above two islands. The Hawaii islands are in the form of an archipelago of islands in the Pacific Ocean with an area of 166 642 km. According to population statistics for the year 2000, the number of Hawaii's population is 1,211,537 people. Honolulu is the capital and largest city of Hawaii is made up of 19 main islands.
Hawaii is the last States that have joined the American Union and the state, which sets it apart from many others. In addition to the location of the last end in the American South is the only state that lies entirely in the tropical areas.
Captain Cook discovered in 1778 and has remained a crown a long time and was at that time under the reign of four local kings.
Climate: Tropical Island, but it varies from one region to another depending on the location and the system of the terrain and the direction of the wind, rain and falling most of the year with the intensity of rainfall in the months of November and April.
|
__label__1
| 0.978741
|
I agree with the above as to the engagement ring. It is a conditional gift. Marriage satisfied the condition. You cannot be forced to return the engagement ring. Probably same is true as to wedding ring. As for other gifts during the marriage, generally they are completed upon delivery, HOWEVER, there may have been agreements/strings that attached at the time of the gift which could make that analysis less clear. As advised, it is best to consult an attorney where a full factual history can be taken and analyzed to provide a more performable response.
|
__label__1
| 0.506504
|
In honor of Joe Louis' 100th birthday, watch him knock out Max Schmeling
The greatest Detroit champion was born on May 13, 1914
By Jeff Wattrick - Web Editor
Headline Goes Here
1914: Boxer Joe Louis, considered to be one of the greatest heavyweights of all time, is born in Lafayette, Alabama. Nicknamed the "Brown Bomber," Louis was the World Heavyweight Champion from…
Few athletes, indeed few others in any field, are so identified with Detroit as Joe Louis.
The Brown Bomber, who held the world heavyweight title from 1937-1949, is still considered among the greatest fighters in history. He would have turned 100-years-old today.
Louis was born in Chambers County, Alabama on May 13, 1914 as Joe Louis Barrow. His family moved to Detroit in 1926 as part of the Great Migration.
Learning to fight at the Brewster Recreation Center, he fought under the name Joe Louis supposedly because "Joe Louis Barrow" wouldn't fit on an entry form for an amateur bout.
He won the heavyweight championship on June 22, 1937, knocking out James J. Braddock in the eighth round. He became only the second African-American heavyweight champion after Jack Johnson.
However, it was exactly one year later when Louis would score a first-round knockout against Max Schmeling in the fight that would define his legacy.
Two years earlier, Schmeling delivered Louis the only loss of his career until that point and Louis had said he wouldn't consider himself the legitimate champ until he avenged the loss.
With World War II looming, Louis was perceived as a symbol for all that was right with the United States against the German Schmeling. President Franklin Roosevelt allegedly told Louis he was "the muscles we need to beat Germany."
Meanwhile, Nazi propagandists hyped Schmeling as a symbol of their Aryan ideals--though Schmeling was anti-Nazi and had hid his Jewish manager's children in his Berlin hotel suite during Kristallnacht.
In the rematch with political as well as pugilistic implications, Louis dominated his German opponent before a sold-out crowd at Yankee Stadium. The fight didn't even last two minutes.
Louis would hold the title until his first retirement in 1949. He would only lose two more fights in his career, to Ezzard Charles Charles in 1950 and Rocky Marciano in 1951, during a comeback effort. Louis finished with a 68-3 (54 KO) pro record.
After retiring for good from the ring, Louis again assumed the role as a racial trailblazer becoming the first African-American to play in a PGA-sanctioned golf tournament.
In later life, Louis and Schmeling became friends. When Louis died in 1981 at the age of 66, it was Schmeling who helped pay for the funeral.
But on that historic night almost 77 years ago, it was Louis who showed he was the best in the world.
Joe Louis-Max Schmeling II
|
__label__1
| 0.974077
|
Ben Affleck - 7 Swoon-Worthy Celebrity Dads | Fit Pregnancy - Fit Pregnancy
7 Swoon-Worthy Celebrity Dads
The recently retired soccer star says the hardest thing for him is being away from his family when he has to travel for work.
"It's only for a short time, but it's difficult being away from the children every single day. ... They understand that daddy works hard.
And what about his feelings on having a daughter after three sons?
"To have a daughter is a whole different story. I'm not saying I love my daughter more. It's just that boys are independent."
He and wife Victoria Beckham have three sons, Brooklyn, Romeo and Cruz, and one daughter, Harper.
Most Popular in parenting
|
__label__1
| 0.943863
|
Economic Engines
When Height's Not Right for Urban Planning
Kitsilano, a lovely old neighborhood in Vancouver, British Columbia, looks much the same as it did a century ago when it was designed around a streetcar line. It still has enormous homes perched on lawns with alleys in the back, all within sight of downtown’s shimmering skyscrapers.
But unlike in 1930, when the neighborhood was home to a population of about 28,000, a lot more people live in Kitsilano now. By 2011, about 41,000 were living there. With family sizes smaller, the number of residences has increased by an even larger percentage. But just where are these new people and their homes if Kitsilano looks largely unchanged? READ MORE
Why Moving Isn't All Bad
There are two reigning views of internal migration in America. For the educated middle class, it’s seen as a good thing. Moving out means moving up. Indeed, most of us see our own moves as representing an opportunity to get ahead in life. It’s the same for immigrants from other countries, who move here searching for a better life.
But when it comes to lower-income Americans, particularly blacks and Hispanics, migration is almost always seen as a bad thing. The overwhelming narrative is one of displacement instead of opportunity. READ MORE
An Old Idea for the New App-Based Economy
Something like that certainly seems to be happening. Just as Uber and Lyft are taking on traditional taxi companies, Airbnb, TaskRabbit and dozens of other app-centered companies are taking on local companies in their industries. “When you can connect and share assets, people and ideas, everything changes, not just how you rent a car,” writes Robin Chase, co-founder of Zipcar, in her new book Peers Inc. This new world, she adds, “redefines our understanding of assets -- proprietary versus in-common, private versus public, commercial use versus personal use -- and requires a rethinking of regulations, insurance and governance.” READ MORE
What Is the Real American Dream?
Of Eyesores and Assets
If you look at a map of Terrassa, a medium-sized city about 20 miles from Barcelona in the Catalonia region of Spain, you’ll see a jagged green gash, about two miles long, running down the middle of the city. Until recently, this was a dark, imposing ravine that, despite cliffs studded with a historic castle, an ancient church and 19th-century brick mill buildings, was a place where few locals -- much less outsiders -- ventured. “It was a dirty, dangerous place where people were scared to walk,” a local taxi driver told me.
Today the ravine is a verdant canyon filled with walkways, bridges, small restaurants, playgrounds, lawns, trees and a pool at one end that you could practically float an aircraft carrier in. Parc de Vallparadis is clearly a well-loved and well-used space. Even on a late summer afternoon in the middle of a heat wave, it was filled with people. “My husband and I go there all the time,” said my taxi driver. “It’s the lungs of the city.” READ MORE
|
__label__1
| 0.938118
|
A solar-powered trash compacting bin. One of Santa Clarita, Calif.'s solar-powered trash compacting bins. Photo courtesy of Mark Patti/City of Santa Clarita.
Being green isn’t always easy, particularly for a city with limited resources to spend on environmental programs. But Santa Clarita, Calif., has found an affordable way to help reduce its carbon footprint — solar-powered, self-compacting trash bins.
Thirty-four of the trash and recycling units are now located in parks and various public spaces throughout Santa Clarita, giving citizens a simple way to contribute to the city’s environmental health. In addition, instead of making daily trips to empty the containers, city employees now monitor their capacity remotely with a mobile app, improving workflow efficiency.
If a bin appears green on the application, it means there’s plenty of space left for more bottles and cans. If it appears yellow, the bin is starting to get full and will require attention soon. If the container is marked red, there is less than 10 percent capacity left and should be emptied.
“Normally when park staff would go out to a site, they would have to check every single container in the park,” said Mark Patti, project development coordinator with Santa Clarita. “With the solar containers … they are being checked once or twice a week.”
Designed by Big Belly Solar, the units were installed over a 10-day period earlier this year. Thirty of the bins are strictly for recyclable materials, while the other four compactors are dual-purpose, featuring bins for both regular trash and recyclables. The project cost $120,000, which was paid for by a state grant from the California Department of Resources Recycling and Recovery (CalRecycle).
Santa Clarity isn't the first to adopt this solar compactor technology. In the last few years, a number of other cities have successfully deployed the same including Philadelphia, Boston, and Pasadena, Calif., among others.
And it was the money and time the containers saved Philadelphia that put the technology on Patti's radar, he said. Prior to the Big Belly Solar compactors being installed, Santa Clarita only had a few 55-gallon containers in its parks to collect recyclables. Those were getting scavenged, however, so the city wasn’t able to judge how much patrons used them.
With the new technology in place, however, Santa Clarita has seen a significant amount of recyclable materials being collected. As one of the conditions of receiving the state grant, the city is required to monitor the amount of beverage containers being recycled. In the first five months, it has collected 2.5 tons of material it wasn't capturing before.
The city has partnered with a nonprofit group called the LA Conservation Corps to obtain further recycling statistics. After city staff empties the Big Belly containers, the LA Conservation Corps takes and centralizes all the recyclables, divides them up and gives the city quarterly metrics on the amount of glass, aluminum and plastic that has been collected per pound.
“We’ve actually had to double our own dumpster capacity at Central Park where we store all the recyclables that are collected from these Big Belly units because more and more people are taking note of the containers,” Patti said. “If that trend were to continue, we’d definitely consider putting more containers in, because it’s clearly saving our staff time.”
Brian Heaton | Senior Writer
|
__label__1
| 0.626097
|
Icons 1423859675 9 Natural Light
Description backgrounds 1423859674 natural light intro
The “sun rises“ and the ”sun sets.“ This rhythm sets a pattern to our lives. The light of the sun also allows us to see. Light from the sun is actually the visible part of the electromagnetic spectrum, or waves of charged particles that travel at the speed of light: 186,000 miles per second (220,000 kilometers per second). Watch this TEDed video, Light waves, visible and invisible. Direct sunlight is made up of different wavelengths of light or colors that merge together to give us the brilliance of white sunlight whereas indirect light from the north gives a room a blue cast. Sunlight is absorbed by Earth’s atmosphere or can be reflected by clouds and dust, or transmitted directly on a clear sunny day. Passing light through a prism results in different colors of light (with different wavelengths) bending as they pass from low density air to higher density prism glass. Voila, a spectrum! Our eyes capture thousands of edges or lines per second and reflect their light back into our eyes. The edges or lines are focused onto our retina and then to our brain and form memories of images. When the sunrises, forms become articulated textures. Sunlight falls onto surfaces and is absorbed (as on a black roof), reflected (as from a mirror) or transmitted (when it passes through clear glass). Humans are drawn to light and have made use of natural light to illuminate the spaces where they work and live since the very beginning. Daylight stimulates the mind and connects us with nature.
Let there be light!
Activity 1 – The dance of the sun and the earth
Backgrounds 1444428364 natural light a1 %2872%29
The earth revolves around the sun. The half of the earth facing the sun is in sunrise, noon and sunset time. The half away from the sun is in dusk and night. The earth rotates as it revolves around the sun in solar days on a tilted axis. The time of one revolution is one year or 365. 26 days. The earth’s tilt, as it rotates around its axis gives us our 24 hour day. Look at the rotation and see how the earth’s tilt bring its closer to the sun during the Perihelion stage and further from the sun during the Aphelion stage.
Watch The Reasons for the seasons.
sunlight: light cast on the earth by the sun
sun position: direction sun points towards a particular structure or space and the angle it appears in the sky above the horizon line.
day lighting: the use of the sunlight to light a space to minimize use of artificial lighting
Draw the sun in a diagram with the rotation of the earth. Label the miles between the sun and the earth at the Perihelion stage and the Aphelion stage. Label the equinoxes.
Activity 2 – Light reactions
Backgrounds 1444428664 natural light a2
We see because of light. To be seen, objects must reflect light or emit light. Sunlight falls onto surfaces and is absorbed (as on a black roof), reflected (as from a mirror), or transmitted (passing through clear glass). When light is reflected, the incoming angle of incidence equals the angle of reflection. Refracted light is light that is bent or changes direction. Light in a prism is refracted. Sometimes, depending on the surface of the material or lens sunlight hits, light can scatter in multiple angles at one time. Diffraction is a slight bending of light around the edge of an object. Draw the different behaviors of light in your journal and submit them to the gallery.
translucent: material that allows partial transmission of light
transparent: material that allows 100% of light to pass through
opaque: material that blocks 100% of light passing through
Activity 3 – Shadow Watch
Backgrounds 1423859678 natural light activity 01
Pick a room in your house that has windows facing south so that during the day, sunlight spills into the room. On an 11 x 17 piece of paper, make a chart for the 24 hours of a day. Set a camera in the room in a place where it cannot be moved. Take one picture every hour of the day…and night!!! Print your pictures in a series and see how the mood and atmosphere of the room changes with the presence of sunlight or the absence of sunlight (shadows). Print your pictures at a small scale then paste four different moods in your journal. An option is to draw the view at four different times of day. Draw the view once in the morning, once at noon, once at 6pm and once in the evening. Look at the change in values, views, and detail definition.
Illustrate illumination!
Activity gallery camera
Activity 4 – Light Wall
Backgrounds 1423859711 natural light activity 02
Begin with a large sheet of foam core. Thinking about windows, cut openings into the foam core of different shapes and sizes. Cover the openings with an assortment of papers and common materials you find around your house, then tape them to the foam core on the backside. Some materials to use are: newspaper, foil, waxed paper, typing or tracing paper, toilet paper, paper towel, tape, translucent plastic, grids, and different scraps of cloth. Take a flashlight and shine the light through the materials. On the front side, label whether the material absorbs, reflects, or transmits light. Paste an opaque, translucent, reflective, and transparent material in your journal and label each of them.
Reflect, refract, transmit, absorb!
Activity gallery camera
Activity 5 – Light Box
Backgrounds 1423859726 natural light activity 03
Find an empty box, preferably all white. Take the top of the box off and set the box on its side. On the remaining five sides, design openings in the box from above, on the sides and from the bottom. Make some of the openings linear, others in a pattern or repetitive shapes. Place an object inside of your box. Cut the openings with an exacto knife keeping the edges of the opening clean. Take a flash light and shine the light outside of the box while looking into the box. See how the direction and source of the light changes the effect of the space and the mood of the displayed object. Show your magic light box to a friend!
Create some shadows of your own with the light box on the right!
Make light magic!
Activity gallery camera
• Natural lighting is light that comes from the sun.
• Light travels at 200,000 miles per hour.
• The visible part of the electromagnetic spectrum is made up of the colors of the rainbow.
• When different colors of light are mixed together, the light becomes white.
• Light is necessary to see.
check answers
|
__label__1
| 0.994895
|
f @
on 5 lists
Herman Munster
Herman Munster, 5th Earl of Shroudshire, is a fictional character in the CBS sitcom The Munsters, originally played by Fred Gwynne. The patriarch of the Munster household, Herman is an entity much like Frankenstein's monster along with Lurch on the show's competitor The Addams Family.
... more on Wikipedia
|
__label__1
| 0.980065
|
We regularly hear calls to improve “ocean health.” Health is a powerful metaphor, but scientists have had no way to measure it and therefore no means to evaluate how the world's oceans are doing. More than 60 researchers from a cross section of disciplines and institutions, including the National Center for Ecological Analysis and Synthesis (NCEAS) at the University of California, Santa Barbara, have created the Ocean Health Index to do just that. It rates the health of ocean waters bordering 171 coastal countries and territories. Each nation's overall score is the average of scores for 10 widely held public goals for healthy oceans, including sustainable food provision, recreation, fishing opportunities and biodiversity.
The index, which was published in August in Nature, is not a measure of how pristine the ocean is. (Scientific American is part of Nature Publishing Group.) Instead it measures how sustainably the ocean is providing the things people care about. The goals are universal measures of ecosystem health—all 10 must be met for a country's ocean to be rated as healthy—but the relative importance of each goal can vary from place to place.
Factoring human goals into assessments of ocean health is a radical departure from traditional conservation approaches. Yet public policy and conservation organizations worldwide are rapidly converging on the view that people are now a fundamental part of every ecosystem on the earth, and any effective management strategy must embrace this reality. If we focus only on excluding people from nature, conservation plans are doomed to fail.
The index is an important first step. Countries cannot make progress on ocean health without first knowing where they stand. In that sense, the index is a key benchmark. Later this year the NCEAS and various partners will test its application in the U.S., Fiji and Brazil. Policy makers and managers could use the index to guide decision making—for example, about whether offshore wind energy should be expanded in the U.S., whether land or ocean conservation measures will benefit coral reefs in Fiji and how marine-zoning plans in Brazil might affect overall ocean health.
Of course, various people or adjacent countries might put different priorities on different goals. As a tool that lays them all out, the index can aid any negotiations by identifying trade-offs and synergies.
» For an article that addresses controversy over the index, see "A New Goal for Nature: Healthy, but Not Pristine" by Benjamin S. Halpern.
Interactive by Krista Fuentes
|
__label__1
| 0.997986
|
More than 100 dead in suspected cholera outbreak in Haiti
Doctors are testing for cholera, typhoid and other illnesses in the Caribbean nation's deadliest outbreak since the January earthquake
An outbreak of severe diarrhoea has killed at least 135 people in rural central Haiti and left sick hundreds more, who overwhelmed a crowded hospital on Thursday seeking treatment. Health workers suspected the disease was cholera, but were awaiting tests.
Hundreds of patients lay on blankets in a parking lot outside St Nicholas hospital in the port of St Marc with IVs in their arms for rehydration. As rain began to fall in the afternoon, nurses rushed to carry them inside.
Doctors were testing for cholera, typhoid and other illnesses in the Caribbean nation's deadliest outbreak since the earthquake in January that killed as many as 300,000 people.
Catherine Huck, the deputy country director for the UN Office for the Coordination of Humanitarian Affairs (OCHA), said the Caribbean nation's health ministry had recorded 135 deaths and more than 1,000 people infected.
"What we know is that people have diarrhoea, and they are vomiting, and [they] can go quickly if they are not seen in time," Huck said. She said doctors were still awaiting laboratory results to pinpoint the disease.
The president of the Haitian Medical Association, Claude Surena, said the cause appeared to be cholera, but added that had not been confirmed by the government.
"The concern is that it could go from one place to another place, and it could affect more people or move from one region to another one," he said.
Cholera is a bacterial infection spread through contaminated water. It causes severe diarrhoea and vomiting that can lead to dehydration and death within hours. Treatment involves administering a salt and sugar-based rehydration serum.
The sick come from across the rural Artibonite region, which did not experience significant damage in the 12 January quake but has absorbed thousands of refugees from the devastated capital 45 miles south of St Marc.
Some patients said they drank water from a public canal, while others said they bought purified water. All complained of symptoms including fever, vomiting and severe diarrhoea.
"I ran to the bathroom four times last night vomiting," said 70-year-old Belismene Jean Baptiste.
Trucks loaded with medical supplies including rehydration salts were to be sent from Port-au-Prince to the hospital, said Jessica DuPlessis, a spokeswoman for OCHA. Doctors at the hospital said they also needed more personnel to handle the flood of patients.
Elyneth Tranckil was among dozens of relatives standing outside the hospital gate as new patients arrived near death. "Police have blocked the entry to the hospital, so I can't get in to see my wife," Tranckil said.
Aid groups were mobilising to ship medicine, water filtration units and other relief supplies to the Artibonite region.
"We have been afraid of this since the earthquake," said Robin Mahfood, the president of Food for the Poor, which was preparing to airlift donations of antibiotics, oral dehydration salts and other supplies.
The US embassy in Port-au-Prince issued an advisory note urging people to drink only bottled or boiled water and eat only food that has been thoroughly cooked.
|
__label__1
| 0.785572
|
Lots of rescued data
Here’s one from 2003.
Remember, Remember The Eleventh of September. Majulah Singapura.
Remember, Remember The Eleventh of September.
Majulah Singapura.
This has been circulating in the chat groups on telegram.org and whatsapp.com and want it to be as widely read as possible. I did not wirte it, and I would love to give credit to the author. If you are the author or know who wrote it. please tell me so that I can give credit where credit is due.
As the silly season starts
By noon on September 1st, we will know who are running for the 89 seats in the parliament.
As voters we are all keen to know who the candidates are. The irony is that the majority voters don’t really know who their current member of parliament is to begin with. I know who mine is, but I have not met nor spoken to him ever. That being the reality, how would you go about making a considered and fair assessment of how you should be casting your vote.
Let me offer up a short checklist to help with the thinking:
1. Is your’s, your family’s and of Singapore’s future important to you?
2. If you said YES to 1, do you think the candidate(s) in your ballot paper will be able to deliver the future you want?
3. If you said NO to 1, it does not matter who you vote for. So VOTE, PLEASE DON’T SPOIL THE VOTE EVEN THOUGH YOU HAVE THE RIGHT TO SPOIL IT.
4. If you said YES to 2, have you understood who the candidate(s) is(are) and where they stand on issues that is of concern to you? Have you done sufficient research to be able to be honest to yourself to come to a decision?
5. If you said NO to 2, are you prepared to find out why you think they cannot deliver the future you want?
6. If you said NO to 5, it does not matter who you vote for. So VOTE, PLEASE DON’T SPOIL THE VOTE EVEN THOUGH YOU HAVE THE RIGHT TO SPOIL IT.
7. If you said YES to 5, do spend time reading, talking to family, friends, colleagues or just about any other Singaporean voter. Do make sure that you get to hear from all sides not just one side.
See, it is quite easy to navigate the silly season.
Do be aware that what is called “Mainstream Media” (MSM), which especially in the Singapore context, has very low credibility in terms of being fair, balanced and critical. These MSM include the newspapers, TV and radio owned and operated by Singapore Press Holdings and MediaCorp. These entities are government-linked companies and have never been known to challenge or be critical of government policies. Investigative and critical reporting is NOT what they can ever do (or to be fair, allowed to do).
Having said all of that, do take about 10 minutes to listen to this TEDx talk that discusses how entities, like governments and political parties, would do all that they can to astroturf opinion and understanding of issues. Don’t be lulled by catchphrases, innuendoes, carrots, meat etc.
And, yes, this post could perhaps be also playing that game.
Majulah Singapura!
He probably is indeed telling the truth! (info graphic updated on Aug 29)
It would appear that ESM Goh Chok Tong is indeed telling the truth that “checks and balances are a seductive lie”.
He says in that article that: “the check comes from the “integrity of the leadership in PAP.”
Let’s dissect the notion of checks and balances. I will draw reference to how the PAP-run town councils built-sold-then-leased-back the town council management system. This system was withdrawn from use by the Worker’s Party following their 2011 general election take over of the Aljunied GRC.The fact that a key piece of infrastructure needed to run the town council had to be replaced with something new, I would assert, contributed to the issues that the Aljunied-Hougang-Punggol-East Town Council faced.
The town council management software was paid for from public funds, not party funds. The public funds also included funds from contributions made to the town councils that were under the PAP then. So, just because there was a “change” in the MPs running the GRC/town council, to then deny them a key infrastructure goes against all commonsense and fairness.
And to make things even worse, the “Coordinating Chairman” of the PAP town councils made statements that were totally wrong. In my post in 2013, I addressed his comments and you can read it there.
Coming back to what ESM Goh said a couple of days ago about checks and balance being a seductive lie, he probably is telling the truth. The PAP, it would appear, has been lying all along and seduced us all.
Let me share this info graphic which was sent to me. I am not sure of the origin of it or what licence is it made available (assuming CC). It seems to be from a facebook page of Temasek Review.
From Temasek Review’s Facebook page. Assuming CC license.
Update: August 29, 2015. The infographic above is incorrect and I have updated it to reflect that there indeed was a tender to sell the system.
updated infographic to reflect that there was a tender called.
updated infographic to reflect that there was a tender called.
The need for a independent Electoral Commission
I am reading the Candidate Handbook for Parliamentary Election 2015 for the first time. I don’t have any of the earlier versions so I cannot tell what the changes are (yes, no edit history/change log; here’s a local copy: Candidate Handbook for Parliamentary Election 2015_1 in case the ELD.gov.sg site goes down).
According to Section 4.1 of the handbook:
Candidates should conduct election campaigning in a responsible and dignified manner that befits the seriousness of the election process. Candidates should steer away from negative campaigning practices based on hate and denigration of opposing candidates, and should not make false statements that allege corruption or commission of criminal offences, or statements that may cause racial or religious tensions or affect social cohesion. Egregious acts of negative campaigning could also be in breach of the law.
As noted by Viswa Sadasivan in his IQ post, this paragraph has many issues. Who would be the adjudicators of this? How does one raise an infraction?
We could crowd source to tally up of the various transgressions on an hourly/daily basis on a wiki or Google doc. This will help, if nothing else for posterity, but more so for transparency, regardless what is done with “the list”.
Further reading of the Candidate Handbook gives more nuggets:
On page 30 (Section 4.5.4):
iv. no form of public entertainment (such as singing, dancing or showing a film) shall be provided, and no live-streaming of any event (including the election meeting itself) shall be shown before, during and after the election meeting;
I wonder what the “live streaming” is referred to here? I have to assume that it means that live streaming done by the candidate/party themselves is a no go. I cannot see how I, as a person in the audience at the rally, choosing to use Google Hangouts or Periscope to stream the rally is a no go. I have the right to do so.
These additional conditions are intriguing (page 30/31):
Other conditions that will be imposed are:
a. only persons named in the application for the permit and who are approved as speakers can speak at the election meeting;
b. members of the Central Executive Committee or an equivalent governing body of a political party as well as candidate(s) from the same political party who are nominated in accordance with the provisions of the Parliamentary Elections Act (Cap 218) for election as a Member of Parliament for an electoral division shall only be permitted to speak at election meetings held by their own political party. They may not speak at election meetings held by an Independent Candidate or another political party even if they are concurrently members (of any type) of that other political party. The reference to a political party includes political alliances registered as a political party. An Independent candidate can only speak at election meetings for which a permit has been issued to him/her or his/her election agent. He/She will not be allowed to speak at election meetings held by political parties or other Independent candidates contesting in the elections. However, where a member of the Central Executive Committee member or an equivalent governing body of a political party has been nominated in accordance with the provisions of the Parliamentary Elections Act for election as a Member of Parliament for an electoral division as a candidate for another political party or as part of a group of Independent candidates, he may be permitted to speak at all election meetings held by that other political party or at the election meeting held by that group of Independent candidates as the case may be;
emphasis added
Why would you DISALLOW a party or independent candidate from speaking at each other’s rally? While it would be strange for “opposing” candidates to speak at each other’s rally, stating it the way it is done smacks of being excessive and is curtailing one’s freedom to speak. Granted that no one would want to or accept an invitation to speak at a PAP rally, but denying it explicitly, seems rather draconian.
Why did I name this post “the need for an independent electoral commission”? The fact that these “guidelines” did not have any public consultation – it might have been there but I cannot find any references to such. Because the Elections Department reports to the Prime Minister, I doubt that they have any form of independence or opportunity to do things better that could be negative for the PAP but good for Singapore.
More drama to unfold I am sure.
Five days to nomination.
And the games have begun
26 August 2015
|
__label__1
| 0.835162
|
Aztekium BOT: What is Emma disambiguation
Aztekium Bot
User: What is Emma disambiguation
''Emma'' is a 1932 American comedy-drama film released by Metro-Goldwyn-Mayer, and starring Marie Dressler and directed by Clarence Brown.
Emma may refer to:
''Emma'', エマ, Ema is a historical romance manga by Kaoru Mori. It was published by Enterbrain in the magazine '' Comic Beam'' and collected in 10 tankōbon volumes. The series has been adapted as an anime television series, entitled ''Emma - A Victorian Romance'', 英國戀物語エマ, Eikoku Koi Monogatari Emma. The manga is licensed in English in North America by CMX and the anime is licensed in English by Nozomi Entertainment.
''Emma'' is a 1996 period film based on the novel of the same name by Jane Austen. Directed by Douglas McGrath, the film stars Gwyneth Paltrow, Alan Cumming, Toni Collette, Ewan McGregor, and Jeremy Northam.
Jane Austen's ''Emma'' is an adaptation of the 1815 novel of the same name. It was adapted for the British television network ITV in 1996, directed by Diarmuid Lawrence and dramatised by Andrew Davies, the same year as Miramax's film adaptation of '' Emma'' starring Gwyneth Paltrow. This production of ''Emma'' stars Kate Beckinsale as the titular character, and also features Samantha Morton as Harriet Smith and Mark Strong as Mr. Knightley.
Jane Austen's novel '' Emma'' (1815) was released as a six-part TV serial by the BBC in 1972.
''Emma'' (or ''Emma: A Play in Two Acts about Emma Goldman, American Anarchist'', its full title) is a play by historian and playwright Howard Zinn (1922–2010). It was first performed in 1976.
"Emma", also known as "Emma, Emmaline" or "Emmeline", is a song by Errol Brown and Tony Wilson released as a single by Hot Chocolate in 1974. It reached number 3 in the UK Singles Chart and number 8 in the US Billboard Hot 100 chart. After being asked by producer Mickie Most to add "depth and darkness" to his compositions, Brown wrote the song about the death of his mother.
Emma (born Emma Louise Booth, 2 August 1974, Bridgend, Wales) is a Welsh singer, who sang the UK entry, " Give a Little Love Back to the World", in the Eurovision Song Contest 1990.
The Electron Machine with Many Applications (EMMA) is a project at Daresbury Laboratory in the UK to build a linear non-scaling FFAG to accelerate electrons from 10 to 20 MeV. A FFAG (Fixed Field Alternating Gradient) is a type of accelerator in which the magnetic field in the bending magnets is constant during acceleration. This means the particle beam will move radially outwards as its momentum increases.
''Emma'' is a 1955 novel by F. W. Kenyon published by Thomas Y. Crowell Company.
For U.S. founded Emma Magazine (unrelated to German EMMA), see .
''EMMA'' is a German feminist magazine. Its print edition is published quarterly.
''Emma'' is a four-part BBC television drama serial adaptation of Jane Austen's novel '' Emma'', first published in 1815. The episodes were written by Sandy Welch, acclaimed writer of previous BBC costume-dramas '' Jane Eyre'' and '' North & South'', and directed by Jim O'Hanlon. The serial stars Romola Garai as the titular heroine Emma Woodhouse, Jonny Lee Miller as her loyal lifelong friend Mr. Knightley and Michael Gambon as Emma's father, Mr. Woodhouse. The serial originally ran weekly on Sunday nights on BBC One from the 4 to 25 October 2009.
The ''Emma'' was a River Flat launched on 29 February 1828 along the Mersey and Irwell Navigation, in Manchester. Built by the New Quay Company, it was one of the largest cargo vessels to be built alongside the Irwell. The vessel capsized shortly after its launch, causing the deaths of as many as 47 of its estimated 200 passengers. Many others were rescued by bystanders, and treated by surgeons along the river banks. The ''Emma'' was eventually righted, and spent the rest of its life working along the River Weaver.
Emma is a given female name. It is derived from the Germanic word ''ermen'' meaning whole or universal, and was originally a short form of Germanic names that began with ermen. Emma is also used as a diminutive of Emily, Emmeline, Amelia or any other name beginning with "em". It was introduced to England by Emma of Normandy, who was the wife both of king Ethelred II (and by him the mother of Edward the Confessor) and later of King Canute. It was also borne by an 11th-century Austrian saint, who is sometimes called Hemma.
The Emma books are a series for children by Sally Warner. The main character and narrator is Emma McGraw, a new kid who moved in to California from Magdelana school. She has curly brown hair and wants to be a zoologist when she grows up. She is currently in third grade. She wishes that she would have normal, straight hair and not be divorced.
In Buddhist mythology, Yama ( Sanskrit: यम) is a dharmapala (wrathful god) said to judge the dead and preside over the Narakas ("Hells" or "Purgatories") and the cycle of rebirth.
Java Code Coverage Tools are distinguished in two main categories: first tools that add statements to the source code and require to recompile the source code. And second, tools which instrument the byte code either before or while running it. The goal is to find out which parts of code are tested by registering the lines of code executed when doing the test.
E.M.M.A were a Swedish girl group, mostly popular in Sweden. The group was founded by Keith Almgren who also wrote all the lyrics for their debut album. They have released three albums and eight singles. The group went on several small tours in Sweden. They came into existence in 2001 and officially broke up on 26 October 2005. The members were Elin Klingfors (born 25 December 1990), Martina Ståhl (born 1 December 1988), Mari-Linn Almgren Klevhamre (born 10 May 1992) and Alexandra Pettersson (born 22 February 1990).
Emma was a severe extratropical cyclone which passed through several mainly Central European countries, most devastatingly on Saturday March 1, 2008, killing at least twelve people in Austria, Germany, Poland and the Czech Republic. Wind speeds reached up to 166 km/h (103 mph) in Austria, and up to 180 km/h (112 mph) elsewhere. Major infrastructure disruptions and some injuries were also reported in Belgium, France, Switzerland, and the Netherlands.
The EMMA – Espoo Museum of Modern Art ( EMMA - Espoon modernin taiteen museo, EMMA - Esbo moderna konstmuseum), is a major art museum in Espoo in southern Finland. After the founding of Espoo Art Museum Foundation in September 2002, EMMA opened its doors for visitors in 2006. With its 5000 square metre exhibition space, it is the largest museum in the whole of Finland. The permanent exhibition presents a selection from The Saastamoinen Foundation Art Collection and the other half the changing domestic and international exhibitions.
Formation Autonomy Spacecraft with Thrust, Relnav, Attitude and Crosslink (or FASTRAC) is a pair of nanosatellites (respectively named ''Sara-Lily'' and ''Emma'') developed and built by students at The University of Texas at Austin. The project is part of a program sponsored by the Air Force Research Laboratory (AFRL), whose goal is to lead the development of affordable space technology. The FASTRAC mission will specifically investigate technologies that facilitate the operation of multiple satellites in formation. These enabling technologies include relative navigation, cross-link communications, attitude determination, and thrust. Due to the high cost of lifting mass into orbit, there is a strong initiative to miniaturize the overall weight of spacecraft. The utilization of formations of satellites, in place of large single satellites, reduces the risk of single point failure and allows for the use of low-cost hardware.
Tenille Dashwood In 2005, Dashwood made some appearances for the Australian wrestling promotion PWA under the ring name Valentine. However, from the age of 16 to 18, Dashwood was limited to merely setting up the ring at events and helping out after she suffered a severe shoulder injury. In 2007, she moved to Calgary, Alberta, Canada for a few months to train with Lance Storm at the Storm Wrestling Academy.
Emmanuela Marrone, also known as Emma or Emma Marrone (born May 25, 1984, in Florence, Italy) is an Italian pop/ rock singer.
Frequently Asked Questions for BOT:
Deklinacja wyrazu niewykładzinowość?
Deklinacja wyrazu niegrodziczeńskość?
Deklinacja wyrazu niepodtarnowskość?
Jaka jest najwyższa forma życia zwierzęcego?
Co powinien robić w domu prawdziwy mężczyzna?
Co to jest. Przed użyciem wisi. W czasie użycia stoi. A po użyciu kapie?
Gdzie urodził się Broca Paul Pierre?
Gdzie urodził się Metody?
Gdzie się urodził Hathaway Henry?
Słowo powypierałaś?
Słowo improwizowałaś?
Słowo wynędzałaś?
Deklinacja wyrazu Szałkiewicz?
Odmień przez przypadki wyraz półchłopi
Deklinacja wyrazu miniatorstwa?
in welchen filmen spielte Rob Boltin mit?
Paul Martin Smith in welchen filmen spielt sie mit?
in welcher filmen spielt Richard Hoggard?
what's the phase at STP of Strontium?
what's the phase at STP of Gold?
what's the phase at STP of Lanthanum?
Tradução em inglês apinhar?
dicionário português-inglês chuva?
Como você diz temperar em Inglês?
Odmień przez przypadki rzeczownik kabaliczności?
Odmień przez przypadki rzeczownik pełczyckości?
Odmień przez przypadki wyraz antropozofowie
V jakém filmu si zahrála Albina Dzhanabaeva?
Filmy ve kterých si zahrála Anna Kózka?
Filmy ve kterých si zahrála Anelia Nikolova?
Planetoida Koronis
Asteroida Lewis
Asteroida Melancholia
Co to jest Jelling ?
Jaką powierzchnię ma Jelling ?
Jaką liczbę ludności ma Jelling ?
kod pocztowy Jelling ?
Co to jest Myrosław Dumanski ?
Kiedy się urodził Myrosław Dumanski ?
Gdzie się urodził Myrosław Dumanski ?
Kiedy zmarł Myrosław Dumanski ?
Gdzie zmarł Myrosław Dumanski ?
Co to jest Kongres (Meksyk) ?
What is Eugenics ?
What is United States House of Representatives elections in Arizona, 2008 ?
What is Opostega chalcoplethes ?
что это такое Савин, Евгений Леонидович ?
Какое имя имеет Савин, Евгений Леонидович ?
Какую ширину имеет Савин, Евгений Леонидович ?
Какая дата Савин, Евгений Леонидович ?
Где родился Савин, Евгений Леонидович ?
что это такое Японская оккупационная бирманская рупия ?
Какую ширину имеет Японская оккупационная бирманская рупия ?
Какую ширину изображения имеет Японская оккупационная бирманская рупия ?
что это такое Самойлов, Михаил Васильевич ?
Какое имя имеет Самойлов, Михаил Васильевич ?
Какая дата Самойлов, Михаил Васильевич ?
Где родился Самойлов, Михаил Васильевич ?
Где умер Самойлов, Михаил Васильевич ?
¿que es Condado de Torrepalma ?
¿que es Heartbreak Ridge ?
¿Cuanto dura el/la Heartbreak Ridge ?
¿que es Zenón Rolón ?
All functions list
Bot internetowy. Smart chat bot, Intelligence Bot Intelligence Robot Bot potrafi rozmawiać z ludźmi. Robot internetowy. Sztuczna inteligencja. Inteligentne programy do rozmowy z człowiekiem Inteligentny program, który potrafi rozmawiać z człowiekiem Program z którym możesz porozmawiać Sztuczna inteligencja. Inteligentny Bot. Bot z którym możesz gadać jak z człowiekiem. Bot z którym możesz rozmawiać jak z człowiekiem Program z którym można pogadać to Azbot Program z którym da się rozmawiać Program który umie rozmawiać z człowiekiem Program który potrafi rozmawiać z człowiekiem Program co rozmawia z człowiekiem Program rozmawiający z człowiekiem. Program do rozmowy z człowiekiem Program do rozmowy z ludźmi Internet BOT"Intelligent Internet bot" Bot who speaking with people AI BOT, SI Bot Bot Aztekium speaking with people Bot who speaking foreign languages Bot speaking with men. Bot speaking with man "intelligent internet bot" Ask Bot" You can speak with bot Can you speak with bot aztekium talking to bot, online Czat chat z botem czat z botem czatuj z botem chatuj z botem Pytanko zapytanko zapytaj pytanie asking question Zapytaj Bota. Ask bot, Talking widh web bot.
|
__label__1
| 0.63665
|
There Is Such A Thing As A Declarative Language, and It’s The World’s Best DSL
July 22, 2013
In a recent post I asked whether there is any such thing as a declarative language. The main point was to argue that the standard “definitions” are, at best, not very precise, and to see whether anyone might offer a better definition. What I’m after is an explanation of why people seem to think that the phrase has meaning, even though they can’t say very clearly what they mean by it. (One commenter analogized with “love” and “happiness”, but I would counter by saying that we’re trying to do science here, and we ought to be able to define our terms with some precision.)
As I mentioned, perhaps the best “definition” that is usually offered is to say that “declarative” is synonymous with “functional-and-logic-programming”. This is pretty unsatisfactory, since it is not so easy to define these terms either, and because, contrary to conventional classifications, the two concepts have pretty much nothing in common with each other (but for one thing to be mentioned shortly). The propositions-as-types principle helps set them clearly apart: whereas functional programming is about executing proofs, logic programming is about the search for proofs. Functional programming is based on the dynamics of proof given by Gentzen’s inversion principle. Logic programming is based on the dynamics of provability given by cut elimination and focusing. The two concepts of computation could not be further apart.
Yet they do have one thing in common that is usefully isolated as fundamental to what we mean by “declarative”, namely the concept of a variable. Introduced by the ancient Hindu and Muslim mathematicians, Brahmagupta and al Kwharizmi, the variable is one of the most remarkable achievements of the human intellect. In my previous post I had secretly hoped that someone would propose variables as being central to what we mean by “declarative”, but no one did, at least not in the comments section. My unstated motive for writing that post was not so much to argue that the term “declarative” is empty, but to test the hypothesis that few seem to have grasp the importance of this concept for designing a civilized, and broadly applicable, programming language.
My contention is that variables, properly so-called, are what distinguish “declarative” languages from “imperative” languages. Although the imperative languages, including all popular object-oriented languages, are based on a concept that is called a variable, they lack anything that actually is a variable. And this is where the trouble begins, and the need for the problematic distinction arises. The declarative concept of a variable is the mathematical concept of an unknown that is given meaning by substitution. The imperative concept of a variable, arising from low-level machine models, is instead given meaning by assignment (mutation), and, by a kind of a notational pun, allowed to appear in expressions in a way that resembles that of a proper variable. But the concepts are so fundamentally different, that I argue in PFPL that the imperative concept be called an “assignable”, which is more descriptive, rather than “variable”, whose privileged status should be emphasized, not obscured.
The problem with purely imperative programming languages is that they have only the concept of an assignable, and attempt to make it serve also as a concept of variable. The results are a miserable mess of semantic and practical complications. Decades of work has gone into rescuing us from the colossal mistake of identifying variables with assignables. And what is the outcome? If you want to reason about assignables, what you do is (a) write a mathematical formulation of your algorithm (using variables, of course) and (b) show that the imperative code simulates the functional behavior so specified. Under this methodology the mathematical formulation is taken as self-evidently correct, the standard against which the imperative program is judged, and is not itself in need of further verification, whereas the imperative formulation is, invariably, in need of verification.
What an odd state of affairs! The functional “specification” is itself a perfectly good, and apparently self-evidently correct, program. So why not just write the functional (i.e., mathematical) formulation, and call it a day? Why indeed! Declarative languages, being grounded in the language of mathematics, allow for the identification of the “desired behavior” with the “executable code”. Indeed, the propositions-as-types principle elevates this identification to a fundamental organizing principle: propositions are types, and proofs are programs. Who needs verification? Once you have a mathematical specification of the behavior of a queue, say, you already have a running program; there is no need to relegate it to a stepping stone towards writing an awkward, and invariably intricate, imperative formulation that then requires verification to ensure that it works properly.
Functional programming languages are written in the universally applicable language of mathematics as expressed by the theory of types. Such languages are therefore an integral part of science itself, inseparable from our efforts to understand and master the workings of the world. Imperative programming has no role to play in this effort, and is, in my view, doomed in the long run to obsolescence, an artifact of engineering, rather than a fundamental discovery on a par with those of mathematics and science.
This brings me to my main point, the popular concept of a domain-specific language. Very much in vogue, DSL’s are offered as the solution to many of our programming woes. And yet, to borrow a phrase from my colleague Guy Blelloch, the elephant in the room is the question “what is a domain?”. I’ve yet to hear anyone explain how you decide what are the boundaries of a “domain-specific” language. Isn’t the “domain” mathematics and science itself? And does it not follow that the right language must be the language of mathematics and science? How can one rule out anything as being irrelevant to a “domain”? I think it is impossible, or at any rate inadvisable, to make such restrictions a priori. Indeed, full-spectrum functional languages are already the world’s best DSL’s, precisely because they are (or come closest to being) the very language of science, the ultimate “domain”.
What, If Anything, Is A Declarative Language?
July 18, 2013
Back in the 1980’s it was very fashionable to talk about “declarative” programming languages. But to my mind there was never a clear definition of a “declarative language”, and hence no way to tell what is declarative and what is not. Lacking any clear meaning, the term came to refer to the arbitrary conflation of functional with logic programming to such an extent that “functional-and-logic-programming” almost became a Germanic thing-in-itself (ding an sich). Later, as the logic programming wave subsided, the term “declarative”, like “object-oriented”, came to be an expression of approval, and then, mercifully, died out.
Or so I had thought. Earlier this week I attended a thriller of an NSF-sponsored workshop on high-level programming models for parallelism, where I was surprised by the declarative zombie once again coming to eat our brains. This got me to thinking, again, about whether the term has any useful meaning. For what it’s worth, and perhaps to generate useful debate, here’re some things that I think people mean, and why I don’t think they mean very much.
1. “Declarative” means “high-level”. This just seems to replace one vague term by another.
2. “Declarative” means “not imperative”. But this flies in the face of reality. Functional languages embrace and encompass imperative programming as a special case, and even Prolog has imperative features, such as assert and retract, that have imperative meaning.
3. “Declarative” means “functional”. OK, but then we don’t really need another word.
4. “Declarative” means “what, not how”. But every language has an operational semantics that defines how to execute its programs, and you must be aware of that semantics to understand programs written in it. Haskell has a definite evaluation order, just as much as ML has a different one, and even Prolog execution is defined by a clear operational semantics that determines the clause order and that can be influenced by “cut”.
5. “Declarative” means “equational”. This does not distinguish anything, because there is a well-defined notion of equivalence for any programming language, namely observational equivalence. Different languages induce different equivalences, of course, but how does one say that one equivalence is “better” than another? At any rate, I know of no stress on equational properties of logic programs, so either logic programs are not “declarative” or “equational reasoning” is not their defining characteristic.
6. “Declarative” means “referentially transparent”. The misappropriation of Quine’s terminology only confuses matters. All I’ve been able to make of this is that “referentially transparent” means that beta-equivalence is valid. But beta equivalence is not a property of an arbitrary programming language, nor in any case is it clear why this equivalence is first among equals. In any case why you would decide a priori on what equivalences you want before you even know what it means to run a program?
7. “Declarative” means “has a denotation”. This gets closer to the point, I think, because we might well say that a declarative semantics is one that gives meaning to programs as some kind of mapping between some sort of spaces. In other words, it would be a synonym for “denotational semantics”. But every language has a denotational semantics (perhaps by interpretation into a Kripke structure to impose sequencing), so having one does not seem to distinguish a useful class of languages. Moreover, even in the case of purely functional programs, the usual denotational semantics (as continuous maps) is not fully abstract, and the fully abstract semantics (as games) is highly operational. Perhaps a language is declarative in proportion to being able to give it semantics in some “familiar” mathematical setting?
8. “Declarative” means “implicitly parallelizable“. This was certainly the sense intended at the NSF meeting, but no two “declarative” languages seemed to have much in common. Charlie Garrod proposes just “implicit”, which is pretty much synonymous with “high level”, and may be the most precise sense there is to the term.
No doubt this list is not exhaustive, but I think it covers many of the most common interpretations. It seems to me that none of them have a clear meaning or distinguish a well-defined class of languages. Which leads me to ask, is there any such thing as a declarative programming language?
[Thanks to the late Steve Gould for inspiring the title of this post.]
[Update: wordsmithing.]
[Update: add a remark about semantics, add another candidate meaning.]
[Update: added link to previous post.]
Constructive Mathematics Is Not Metamathematics
July 10, 2013
The publication of the Homotopy Type Theory book has renewed interest in type theory as a foundation for mathematics, and spurred computer scientists to investigate the computational meaning of higher-dimensional types. As I mentioned in a previous post, what makes HoTT work so well for homotopy theory is that it is constructive, which means, at the very least, that it does not postulate that all types are decidable. By Hedberg’s Theorem any type with decidable equality is a set (homotopy 0-type), so a blanket adoption of the classical law of the excluded middle would immediately rule out any higher-dimensional structure.
To my way of thinking, the denial of the universal validity of the excluded middle is not the defining feature of constructivity, but rather a characteristic feature of constructivity—it is the smoke, not the locomotive. But what, then, is the deeper meaning of constructivity that gives rise to the denial of many classical patterns of reasoning, such as proof by contradiction or reasoning by cases on whether a proposition is true or not? Although the full story is not yet completely clear, a necessary condition is that a constructive theory be proof relevant, meaning that proofs are mathematical objects like any other, and that they play a role in the development of constructive mathematics unlike their role in classical mathematics.
The most obvious manifestation of proof relevance is the defining characteristic of HoTT, that proofs of equality correspond to paths in a space. Paths may be thought of as evidence for the equality of their endpoints. That this is a good notion of equality follows from the homotopy invariance of the constructs of type theory: everything in sight respects paths (that is, respect the groupoid structure of types). More generally, theorems in HoTT tend to characterize the space of proofs of a proposition, rather than simply state that the corresponding type is inhabited. For example, the univalence axiom itself states an equivalence between proofs of equivalence of types in a universe and equivalences between these types. This sort of reasoning may take some getting used to, but its beauty is, to my way of thinking, undeniable. Classical modes of thought may be recovered by explicitly obliterating the structure of proofs using truncation. Sometimes this is the best or only available way to state a theorem, but usually one tends to say more than just that a type is inhabited, or that two types are mutually inhabited. In this respect the constructive viewpoint enriches, rather than diminishes, classical mathematics, a point that even the greatest mathematician of the 20th century, David Hilbert, seems to have missed.
The concept of proof relevance in HoTT seems to have revived a very common misunderstanding about the nature of proofs. Many people have been trained to think that a proof is a derivation in an axiomatic theory, such as set theory, a viewpoint often promoted in textbooks and bolstered by the argument that an informal proof can always be written out in full in this form, even if we don’t do that as a matter of course. It is a short step from there to the conclusion that proofs are therefore mathematical objects, even in classical set theory, because we can treat the derivations as elements of an inductively defined set (famously, the set of natural numbers, but more realistically using more natural representations of abstract syntax such as the s-expression formalism introduced by McCarthy in 1960 for exactly this purpose). From this point of view many people are left confused about the stress on “proofs as mathematical objects” as a defining characteristic of HoTT, and wonder what could be original about that.
The key to recognize that a proof is not a formal proof. To avoid further confusion, I hasten to add that by “formal” I do not mean “rigorous”, but rather “represented in a formal system” such as the axiomatic theory of sets. A formal proof is an element of a computably enumerable set generated by the axioms and rules of the formal theory. A proof is an argument that demonstrates the truth of a proposition. While formal proofs are always proofs (at least, under the assumption of consistency of the underlying formal theory), a proof need not be, or even have a representation as, a formal proof. The principal example of this distinction is Goedel’s Theorem, which proves that the computably enumerable set of formal provable propositions in axiomatic arithmetic is not decidable. The key step is to devise a self-referential proposition that (a) is not formally provable, but (b) has a proof that shows that it is true. The crux of the argument is that once you fix the rules of proof, you automatically miss out true things that are not provable in that fixed system.
Now comes the confusing part. HoTT is defined as a formal system, so why doesn’t the same argument apply? It does, pretty much verbatim! But this has no bearing on “proof relevance” in HoTT, because the proofs that are relevant are not the formal proofs (derivations) defining HoTT as a formal system. Rather proofs are formulated internally as objects of the type theory, and there is no commitment a priori to being the only forms of proof there are. Thus, for example, we may easily see that there are only countably many functions definable in HoTT from the outside (because it is defined by a formal system), but within the theory any function space on an infinite type has uncountably many elements. There is no contradiction, because the proofs of implications, being internal functions, are not identified with codes of formal derivations, and hence are not denumerable.
There is a close analogy, previously noted in this blog, with Church’s Law. Accepting Church’s Law internally amounts to fixing the programming language used to define functions in advance, permitting us to show, for example, that certain programs are not expressible in that language. But HoTT does not commit to Church’s Law, so such arguments amount to showing that, for example, there is no Turing machine to decide halting for Turing machines, but allowing that there could be constructive functions (say, equipped with oracles) that make such decisions.
The theory of formal proofs, often called proof theory, was dubbed metamathematics by Kleene. Until the development of type theory the study of proofs was confined to metamathematics. But now in the brave new world of constructive mathematics as embodied in HoTT, proofs (not just formal proofs) have pride of place in mathematics, and provide opportunities for expressing concepts clearly and cleanly that were hitherto obscured or even hidden from our view.
Update: Corrected silly wording mistake.
What’s the big deal with HoTT?
June 22, 2013
Now that the Homotopy Type Theory book is out, a lot of people are asking “What’s the big deal?”. The full answer lies within the book itself (or, at any rate, the fullest answer to date), but I am sure that many of us who were involved in its creation will be fielding this question in our own ways to help explain why we are so excited by it. In fact what I think is really fascinating about HoTT is precisely that there are so many different ways to think about it, according to one’s interests and backgrounds. For example, one might say it’s a nice way to phrase arguments in homotopy theory that avoids some of the technicalities in the classical proofs by treating spaces and paths synthetically, rather than analytically. Or one might say that it’s a good language for mechanization of mathematics that provides for the concise formulation of proofs in a form that can be verified by a computer. Or one might say that it points the way towards a vast extension of the concept of computation that enables us to compute with abstract geometric objects such as spheres or toruses. Or one might say that it’s a new foundation for mathematics that subsumes set theory by generalizing types from mere sets to arbitrary infinity groupoids, sets being but particularly simple types (those with no non-trivial higher-dimensional structure).
But what is it about HoTT that makes all these interpretations and applications possible? What is the key idea that separates HoTT from other approaches that seek to achieve similar ends? What makes HoTT so special?
In a word the answer is constructivity. The distinctive feature of HoTT is that it is based on Per Martin-Löf’s Intuitionistic Theory of Types, which was formulated as a foundation for intuitionistic mathematics as originally put forth by Brouwer in the 1930’s, and further developed by Bishop, Gentzen, Heyting, Kolmogorov, Kleene, Lawvere, and Scott, among many others. Briefly put, the idea of type theory is to codify and systematize the concept of a mathematical construction by characterizing the abstract properties, rather than the concrete realizations, of the objects used in everyday mathematics. Brouwer’s key insight, which lies at the heart of HoTT, is that proofs are a form of construction no different in kind or character from numbers, geometric figures, spaces, mappings, groups, algebras, or any other mathematical structure. Brouwer’s dictum, which distinguished his approach from competing alternatives, is that logic is a part of mathematics, rather than mathematics is an application of logic. Because for him the concept of a construction, including the concept of a proof, is prior to any other form of mathematical activity, including the study of proofs themselves (i.e., logic).
So under Martin-Löf’s influence HoTT starts with the notion of type as a classification of the notion of construction, and builds upwards from that foundation. Unlike competing approaches to foundations, proofs are mathematical objects that play a central role in the theory. This conception is central to the homotopy-theoretic interpretation of type theory, which enriches types to encompass spaces with higher-dimensional structure. Specifically, the type \textsf{Id}_A(M,N) is the type of identifications of M and N within the space A. Identifications may be thought of as proofs that M and N are equal as elements of $A$, or, equivalently, as paths in the space A between points M and N. The fundamental principles of abstraction at the heart of type theory ensure that all constructs of the theory respect these identifications, so that we may treat them as proofs of equality of two elements. There are three main sources of identifications in HoTT:
1. Reflexivity, stating that everything is equal to itself.
2. Higher inductive types, defining a type by giving its points, paths, paths between paths, and so on to any dimension.
3. Univalence, which states that an equivalence between types determines a path between them.
I will not attempt here to explain each of these in any detail; everything you need to know is in the HoTT book. But I will say a few things about their consequences, just to give a flavor of what these new principles give us.
Perhaps the most important conceptual point is that mathematics in HoTT emphasizes the structure of proofs rather than their mere existence. Rather than settle for a mere logical equivalence between two types (mappings back and forth stating that each implies the other), one instead tends to examine the entire space of proofs of a proposition and how it relates to others. For example, the univalence axiom itself does not merely state that every equivalence between types gives rise to a path between them, but rather that there is an equivalence between the type of equivalences between two types and the type of paths between them. Familiar patterns such as “A iff B” tend to become “A\simeq B“, stating that the proofs of A and the proofs of B are equivalent. Of course one may choose neglect this additional information, stating only weaker forms of it using, say, truncation to suppress higher-dimensional information in a type, but the tendency is to embrace the structure and characterize the space of proofs as fully as possible.
A close second in importance is the axiomatic freedom afforded by constructive foundations. This point has been made many times by many authors in many different settings, but has particular bite in HoTT. The theory does not commit to (nor does it refute) the infamous Law of the Excluded Middle for arbitrary types: the type A+(A\to \textbf{0}) need not always be inhabited. This property of HoTT is absolutely essential to its expressive power. Not only does it admit a wider range of interpretations than are possible with the Law included, but it also allows for the selective imposition of the Law where it is needed to recover a classical argument, or where it is important to distinguish the implications of decidability in a given situation. (Here again I defer to the book itself for full details.) Similar considerations arise in connection with the many forms of Choice that can be expressed in HoTT, some of which are outright provable, others of which are independent as they are in axiomatic set theory.
Thus, what makes HoTT so special is that it is a constructive theory of mathematics. Historically, this has meant that it has a computational interpretation, expressed most vividly by the propositions as types principle. And yet, for all of its promise, what HoTT currently lacks is a computational interpretation! What, exactly, does it mean to compute with higher-dimensional objects? At the moment it is difficult to say for sure, though there seem to be clear intuitions in at least some cases of how to “implement” such a rich type theory. Alternatively, one may ask whether the term “constructive”, when construed in such a general setting, must inevitably involve a notion of computation. While it seems obvious on computational grounds that the Law of the Excluded Middle should not be considered universally valid, it becomes less clear why it is so important to omit this Law (and, essentially, no other) in order to obtain the richness of HoTT when no computational interpretation is extant. From my point of view understanding the computational meaning of higher-dimensional type theory is of paramount importance, because, for me, type theory is and always has been a theory of computation on which the entire edifice of mathematics ought to be built.
The Homotopy Type Theory Book is out!
June 20, 2013
By now many of you have heard of the development of Homotopy Type Theory (HoTT), an extension of intuitionistic type theory that provides a natural foundation for doing synthetic homotopy theory. Last year the Institute for Advanced Study at Princeton sponsored a program on the Univalent Foundations of Mathematics, which was concerned with developing these ideas. One important outcome of the year-long program is a full-scale book presenting the main ideas of Homotopy Type Theory itself and showing how to apply them to various branches of mathematics, including homotopy theory, category theory, set theory, and constructive analysis. The book is the product of a joint effort by dozens of participants in the program, and is intended to document the state of the art as it is known today, and to encourage its further development by the participation of others interested in the topic (i.e., you!). Among the many directions in which one may take these ideas, the most important (to me) is to develop a constructive (computational) interpretation of HoTT. Some partial results in this direction have already been obtained, including fascinating work by Thierry Coquand on developing a constructive version of Kan complexes in ITT, by Mike Shulman on proving homotopy canonicity for the natural numbers in a two-dimensional version of HoTT, and by Dan Licata and me on a weak definitional canonicity theorem for a similar two-dimensional theory. Much work remains to be done to arrive at a fully satisfactory constructive interpretation, which is essential for application of these ideas to computer science. Meanwhile, though, great progress has been made on using HoTT to formulate and formalize significant pieces of mathematics in a new, and strikingly beautiful, style, that are well-documented in the book.
The book is freely available on the web in various formats, including a PDF version with active references, an ebook version suitable for your reading device, and may be purchased in hard- or soft-cover from Lulu. The book itself is open source, and is available at the Hott Book Git Hub. The book is under the Creative Commons CC BY-SA license, and will be freely available in perpetuity.
Readers may also be interested in the posts on Homotopy Type Theory, the n-Category Cafe, and Mathematics and Computation which describe more about the book and the process of its creation.
More Is Not Always Better
January 28, 2013
In a previous post I discussed the status of Church’s Law in type theory, showing that it fails to hold internally to extensional type theory, even though one may see externally that the definable numeric functions in ETT are λ-definable, and hence Turing computable. The distinction between internal and external is quite important in logic, mainly because a logical formalism may be unable to express precisely an externally meaningful concept. The classical example is the Löwenheim-Skolem Theorem of first-order logic, which says that any theory with an infinite model has a countable model. In particular the theory of sets has a countable model, which would seem to imply that the set of real numbers, for example, is countable. But internally one can prove that the reals are uncountable (Cantor’s proof is readily expressed in the theory), which seems to be a paradox of some kind. But no, all it says is that the function witnessing the countability of the term model cannot be expressed internally, and hence there is no contradiction at all.
A similar situation obtains with Church’s Law. One may observe empirically, so to say, that Church’s Law holds externally of ETT, but this fact cannot be internalized. There is a function given by Church’s Law that “decompiles” any (extensional) function of type N→N by providing the index for a Turing machine that computes it. But this function cannot be definable internally to extensional type theory, because it may be used to obtain a decision procedure for halting of Turing machines, which is internally refutable by formalizing the standard undecidability proof. In both of these examples it is the undefinability of a function that is important to the expressive power of a formalism, contrary to naïve analyses that would suggest that, when it comes to definability of functions, the more the merrier. This is a general phenomenon in type theory. The power of type theory arises from its strictures, not its affordances, in direct opposition to the ever-popular language design principle “first-class x” for all imaginable values of x.
Another perspective on the same issue is provided by Martin-Löf’s meaning explanation of type theory, which is closely related to the theory of realizability for constructive logic. The high-level idea is that a justification for type theory may be obtained by starting with an untyped concept of computability (i.e., a programming language given by an operational semantics for closed terms), and then giving the meaning of the judgments of type theory in terms of such computations. So, for example, the judgment A type, where A is a closed expression means that A evaluates to a canonical type, where the canonical types include, say, Nat, and all terms of the form A’→A”, where A’ and A” are types. Similarly, if A is a type, the judgment a:A means that A evaluates to a canonical type A’ and that a evaluates to a canonical term a’ such that a’ is a canonical element of A’, where, say, any numeral for a natural number is a canonical member of Nat. To give the canonical members of the function type A’→A” requires the further notion of equality of elements of a type, a=b:A, which all functions are required to respect. A meaning explanation of this sort was suggested by Martin-Löf in his landmark paper Constructive Mathematics and Computer Programming, and is used as the basis for the NuPRL type theory, which extends that account in a number of interesting directions, including inductive and coinductive types, subset and quotient types, and partial types.
The relation to realizability emerges from applying the meaning explanation of types to the semantics of propositions given by the propositions-as-types principle (which, as I’ve previously argued, should not be called “the Curry-Howard isomorphism”). According to this view a proposition P is identified with a type, the type of its proofs, and we say that P true iff evaluates to a canonical proposition that has a canonical member. In particular, for implication we say that P→Q true if and only if P true implies Q true (and, in addition, the proof respects equality, a condition that I will suppress here for the sake of simplicity). More explicitly, the implication is true exactly when the truth of the antecedent implies the truth of the consequent, which is to say that there is a constructive transformation of proofs of P into proofs of Q.
In recursive realizability one accepts Church’s Law and demands that the constructive transformation be given by the index of a Turing machine (i.e., by a program written in a fixed programming language). This means, in particular, that if P expresses, say, the decidability of the halting problem, for which there is no recursive realizer, then the implication P→Q is vacuously true! By taking Q to be falsehood, we obtain a realizer for the statement that the halting problem is undecidable. More generally, any statement that is not realized is automatically false in the recursive realizability interpretation, precisely because the realizers are identified with Turing machine indices. Pressing a bit further, there are statements, such as the statement that every Turing machine either halts or diverges on its own input, that are true in classical logic, yet have no recursive realizer, and hence are false in the realizability interpretation.
In contrast in the meaning explanation for NuPRL Church’s Law is not assumed. Although one may show that there is no Turing machine to decide halting for Turing machines, it is impossible to show that there is no constructive transformation that may do so. For example, an oracle machine would be able to make the required decision. This is entirely compatible with intuitionistic principles, because although intuitionism does not affirm LEM, neither does it deny it. This point is often missed in some accounts, leading to endless confusions. Intuitionistic logic, properly conceived, is compatible with classical logic in that classical logic may be seen as an idealization of intuitionistic logic in which we heuristically postulate that all propositions are decidable (all instances of LEM hold).
The crucial point distinguishing the meaning explanation from recursive realizability is precisely the refusal to accept Church’s Law, a kind of comprehension principle for functions as discussed earlier. This refusal is often called computational open-endedness because it amounts to avoiding a commitment to the blasphemy of limiting God’s programming language to Turing machines (using an apt metaphor of Andrej Bauer’s). Rather, we piously accept that richer notions of computation are possible, and avoid commitment to a “final theory” of computation in which Church’s Law is postulated outright. By avoiding the witnessing function provided by Church’s Law we gain expressive power, rather than losing it, resulting in an elegant theory of constructive mathematics that enriches, rather than diminishes, classical mathematics. In short, contrary to “common sense” (i.e., uninformed supposition), more is not always better.
Update: corrected minor technical error and some typographical errors.
Update: clarified point about incompatibility of recursive realizability with classical logic.
Exceptions are shared secrets
December 3, 2012
It’s quite obvious to me that the treatment of exceptions in Haskell is wrong. Setting aside the example I gave before of an outright unsoundness, exceptions in Haskell are nevertheless done improperly, even if they happen to be sound. One reason is that the current formulation is not stable under seemingly mild extensions to Haskell that one might well want to consider, notably any form of parameterized module or any form of shadowing of exception declarations. For me this is enough to declare the whole thing wrong, but as it happens Haskell is too feeble to allow full counterexamples to be formulated, so one may still claim that what is there now is ok … for now.
But I wish to argue that Haskell exceptions are nevertheless poorly designed, because it misses the crucial point that exception values are shared secrets. Let us distinguish two parties, the raiser of the exception, and the handler of it. The fundamental idea of exceptions is to transfer a value from the raiser to the handler without the possibility of interception by another party. While the language of secrecy seems appropriately evocative, I hasten to add that I am not here concerned with “attackers” or suchlike, but merely with the difficulties of ensuring modular composition of programs from components. In such a setting the “attacker” is yourself, who is not malicious, but who is fallible.
By raising an exception the raiser is “contacting” a handler with a message. The raiser wishes to limit which components of a program may intercept that message. More precisely, the raiser wishes to ensure that only certain previously agreed-upon components may handle that exception, perhaps only one. This property should remain stable under extension to the program or composition with any other component. It should not be possible for an innocent third party to accidentally intercept a message that was not intended for it.
Achieving this requires a secrecy mechanism that allows the raiser and the handler(s) to agree upon their cooperation. This is accomplished by dynamic classification, exactly as it is done properly in Standard ML (but not O’Caml). The idea is that the raiser has access to a dynamically generated constructor for exception values, and any handler has access to the corresponding dynamically generated matcher for exception values. This means that the handler, and only the handler, can decode the message sent by the raiser; no other party can do anything with it other than pass it along unexamined. It is “perfectly encrypted” and cannot be deciphered by any unintended component.
The usual exception mechanisms, as distinct from exception values, allow for “wild-card handlers”, which means that an exception can be intercepted by a third party. This means that the raiser cannot ensure that the handler actually receives the message, but it can ensure, using dynamic classification, that only a legitimate handler may decipher it. Decades of experience with Standard ML shows that this is a very useful thing indeed, and has application far beyond just the simple example considered here. For full details, see my forthcoming book, for a full discussion of dynamic classification and its role for ensuring integrity and confidentiality in a program. Dynamic classification is not just for “security”, but is rather a good tool for everyday programming.
So why does Haskell not do it this way? Well, I’m not the one to answer that question, but my guess is that doing so conflicts with the monadic separation of effects. To do exceptions properly requires dynamic allocation, and this would force code that is otherwise functional into the IO monad. Alternatively, one would have to use unsafePerformIO—as in ezyang’s implementation—to “hide” the effects of exception allocation. But this would then be further evidence that the strict monadic separation of effects is untenable.
Update: Reworked last paragraph to clarify the point I am making; the previous formulation appears to have invited misinterpretation.
Update: This account of exceptions also makes clear why the perennial suggestion to put exception-raising information into types makes no sense to me. I will write more about this in a future post, but meanwhile contemplate that a computation may raise an exception that is not even in principle nameable in the type. That is, it is not conservativity that’s at issue, it’s the very idea.
Get every new post delivered to your Inbox.
Join 1,294 other followers
|
__label__1
| 0.676791
|
Monday, February 28, 2011
Vitamin D production from UV radiation: The effects of total cholesterol and skin pigmentation
Our body naturally produces as much as 10,000 IU of vitamin D based on a few minutes of sun exposure when the sun is high. Getting that much vitamin D from dietary sources is very difficult, even after “fortification”.
The above refers to pre-sunburn exposure. Sunburn is not associated with increased vitamin D production; it is associated with skin damage and cancer.
Solar ultraviolet (UV) radiation is generally divided into two main types: UVB (wavelength: 280–320 nm) and UVA (320–400 nm). Vitamin D is produced primarily based on UVB radiation. Nevertheless, UVA is much more abundant, amounting to about 90 percent of the sun’s UV radiation.
UVA seems to cause the most skin damage, although there is some debate on this. If this is correct, one would expect skin pigmentation to be our body’s defense primarily against UVA radiation, not UVB radiation. If so, one’s ability to produce vitamin D based on UVB should not go down significantly as one’s skin becomes darker.
Also, vitamin D and cholesterol seem to be closely linked. Some argue that one is produced based on the other; others that they have the same precursor substance(s). Whatever the case may be, if vitamin D and cholesterol are indeed closely linked, one would expect low cholesterol levels to be associated with low vitamin D production based on sunlight.
Bogh et al. (2010) recently published a very interesting study. The link to the study was provided by Ted Hutchinson in the comments sections of a previous post on vitamin D. (Thanks Ted!) The study was published in a refereed journal with a solid reputation, the Journal of Investigative Dermatology.
The study by Bogh et al. (2010) is particularly interesting because it investigates a few issues on which there is a lot of speculation. Among the issues investigated are the effects of total cholesterol and skin pigmentation on the production of vitamin D from UVB radiation.
The figure below depicts the relationship between total cholesterol and vitamin D production based on UVB radiation. Vitamin D production is referred to as “delta 25(OH)D”. The univariate correlation is a fairly high and significant 0.51.
25(OH)D is the abbreviation for calcidiol, a prehormone that is produced in the liver based on vitamin D3 (cholecalciferol), and then converted in the kidneys into calcitriol, which is usually abbreviated as 1,25-(OH)2D3. The latter is the active form of vitamin D.
The table below shows 9 columns; the most relevant ones are the last pair at the right. They are the delta 25(OH)D levels for individuals with dark and fair skin after exposure to the same amount of UVB radiation. The difference in vitamin D production between the two groups is statistically indistinguishable from zero.
So there you have it. According to this study, low total cholesterol seems to be associated with impaired ability to produce vitamin D from UVB radiation. And skin pigmentation appears to have little effect on the amount of vitamin D produced.
I hope that there will be more research in the future investigating this study’s claims, as the study has a few weaknesses. For example, if you take a look at the second pair of columns from the right on the table above, you’ll notice that the baseline 25(OH)D is lower for individuals with dark skin. The difference was just short of being significant at the 0.05 level.
What is the problem with that? Well, one of the findings of the study was that lower baseline 25(OH)D levels were significantly associated with higher delta 25(OH)D levels. Still, the baseline difference does not seem to be large enough to fully explain the lack of difference in delta 25(OH)D levels for individuals with dark and fair skin.
A widely cited dermatology researcher, Antony Young, published an invited commentary on this study in the same journal issue (Young, 2010). The commentary points out some weaknesses in the study, but is generally favorable. The weaknesses include the use of small sub-samples.
Bogh, M.K.B., Schmedes, A.V., Philipsen, P.A., Thieden, E., & Wulf, H.C. (2010). Vitamin D production after UVB exposure depends on baseline vitamin D and total cholesterol but not on skin pigmentation. Journal of Investigative Dermatology, 130(2), 546–553.
Young, A.R. (2010). Some light on the photobiology of vitamin D. Journal of Investigative Dermatology, 130(2), 346–348.
Monday, February 21, 2011
The China Study II: Wheat, dietary fat, and mortality
In this post on the China Study II data we have seen that wheat apparently displaces dietary fat a lot, primarily fat from animal sources. We have also seen in that post that wheat is strongly and positively associated with mortality in both the 35-69 and 70-79 age ranges, whereas dietary fat is strongly and negatively associated with mortality in those ranges.
This opens the door for the hypothesis that wheat increased mortality in the China Study II sample mainly by displacing dietary fat, and not necessarily by being a primary cause of health problems. In fact, given the strong displacement effect discussed in the previous post, I thought that this hypothesis was quite compelling. I was partly wrong, as you’ll see below.
A counterintuitive hypothesis no doubt, given that wheat is unlikely to have been part of the diet of our Paleolithic ancestors, and thus the modern human digestive tract may be maladapted to it. Moreover, wheat’s main protein (gluten) is implicated in celiac disease, and wheat contains plant toxins such as wheat germ agglutinin.
Still, we cannot completely ignore this hypothesis because: (a) the data points in its general direction; and (b) wheat-based foods are found in way more than trivial amounts in the diets of populations that have relatively high longevity, such as the French.
Testing the hypothesis essentially amounts to testing the significance of two mediating effects; of fat as a mediator of the effects of wheat on mortality, in both the 35-69 and 70-79 age ranges. There are two main approaches for doing this. One is the classic test discussed by Baron & Kenny (1986). The other is the modern test discussed by Preacher & Hayes (2004), and extended by Hayes & Preacher (2010) for nonlinear relationships.
I tested the meditating effects using both approaches, including the nonlinear variation. I used the software WarpPLS for this; the results below are from WarpPLS outputs. Other analyses of the China Study data using WarpPLS can be found here (calorie restriction and longevity), and here (wheat, rice, and cardiovascular disease). For yet other studies, click here.
The graphs below show the path coefficients and chance probabilities of two models. The one at the top-left suggests that wheat flour consumption seems to be associated with a statistically significant increase in mortality in the 70-79 age range (beta=0.23; P=0.04). The effect in the 35-69 age range is almost statistically significant (beta=0.22; P=0.09); the likelihood that it is due to chance is 9 percent (this is the meaning of the P=0.09=9/100=9%).
The graph at the bottom-right suggests that the variable “FatCal”, which is the percentage of calories coming from dietary fat, is indeed a significant mediator of the relationships above between wheat and mortality, in both ranges. But “FatCal” is only a partial mediator.
The reason why “FatCal” is not a “perfect” mediator is that the direct effects of wheat on mortality in both ranges are still relatively strong after “FatCal” is added to the model (i.e., controlled for). In fact, the effects of wheat on mortality don’t change that much with the introduction of the variable “FatCal”.
This analysis suggests that, in the China Study II sample, one of wheat’s main sins might indeed have been to displace dietary fat from animal sources. Wheat consumption is strongly and negatively associated with dietary fat (beta=-0.37; P<0.01), and dietary fat is relatively strongly and negatively associated with mortality in both ranges (more in the 70-79 age range).
Why is dietary fat more protective in the 70-79 than in the 35-69 age range, with the latter effect only being significant at the P=0.10 level (a 10 percent chance probability)? My interpretation is that, as with almost any dietary habit, it takes years for a chronically low fat diet to lead to problems. See graph below; fat was not a huge contributor to the total calorie intake in this sample.
The analysis suggests that wheat also caused problems via other paths. What are them? We can’t say for sure based on this dataset. Perhaps the paths involve lectins and/or gluten. One way or another, the relationship is complex. As you can see from the graph below, the relationship between wheat consumption and mortality is nonlinear for the 70-79 age range, most likely due to confounding factors. The effect size is small for the 35-69 age range, even though it looks linear or quasi-linear in that range.
As you might recall from this post, rice does NOT displace dietary fat, and it seems to be associated with increased longevity. Carbohydrate content per se does not appear to be the problem here. Both rice and wheat foods are rich in them, and have a high glycemic index. Wheat products tend to have a higher glycemic load though.
And why is dietary fat so important as to be significantly associated with increased longevity? This is not a trivial question, because if too much of that fat is stored as body fat it will actually decrease longevity. Dietary fat is very calorie-dense, and can be easily stored as body fat.
Dietary fat is important for various reasons, and probably some that we don’t know about yet. It leads to the formation of body fat, which is not only found in adipocytes or used only as a store of energy. Fat is a key component of a number of important tissues, including 60 percent of our brain. Since fat in the human body undergoes constant turnover, more in some areas than others, lack of dietary fat may compromise the proper functioning of various organs.
Without dietary fat, the very important fat-soluble vitamins (A, D, E and K) cannot be properly absorbed. Taking these vitamins in supplemental form will not work if you don’t consume fat as well. A very low fat diet is almost by definition a diet deficient in fat-soluble vitamins, even if those vitamins are consumed in large amounts via supplements.
Moreover, animals store fat-soluble vitamins in their body fat (as well as in organs), so we get these vitamins in one of their most natural and potent forms when we consume animal fat. Consuming copious amounts of olive and/or coconut oil will not have just the same effect.
Preacher, K.J., & Hayes, A.F. (2004). SPSS and SAS procedures for estimating indirect effects in simple mediation models. Behavior Research Methods, Instruments, & Computers, 36 (4), 717-731.
Hayes, A. F., & Preacher, K. J. (2010). Quantifying and testing indirect effects in simple mediation models when the constituent paths are nonlinear. Multivariate Behavioral Research, 45(4), 627-660.
Sunday, February 13, 2011
The idea that protein leaches calcium from the bones has been around for a while. It is related to the notion that protein, especially from animal foods, increases blood acidity. The body then uses its main reservoir of calcium, the bones, to reduce blood acidity. Chris Masterjohn does not agree with this idea. This post generally supports Chris’s view, and adds a twist to it, related to plant protein consumption.
The “eat-meat-lose-bone” idea has apparently become popular due to the position taken by Loren Cordain on the topic. Dr. Cordain has also made several important and invaluable contributions to our understanding of the diets of our Paleolithic ancestors. He has argued in his book, The Paleo Diet, and elsewhere (see, e.g., here) that to counter the acid load of protein one should eat fruits and vegetables. The latter are believed to have an alkaline load.
As it turns out, this idea appears to be correct only for plant protein. Animal protein seems to be associated with an increase in BMD, at least according to a study by Promislow et al. (2002). The study shows that there is a positive multivariate association between animal protein consumption and BMD; an association that becomes negative when plant protein consumption is considered.
Sunday, February 6, 2011
|
__label__1
| 0.85233
|
We’ve all experienced it. The meeting goes well. Everyone nods, smiles, and quickly agrees. There are no objections or even questions to answer. You leave feeling confident that your proposal will be unanimously adopted.
boxing glovesThen you hear about the meeting after the meeting… and the lingering concerns and worries that ‘everyone’ has… and you know that the torpedoes have already been launched and your proposal is sunk.
I call this dynamic ‘dysfunctional politeness.’ It costs organization dearly in terms of dollars, but it also takes an enormous human toll: disappointment, mistrust, frustration, and disengagement.
Each time we choose to be agreeable rather than raising legitimate concerns, offering candid feedback, or telling the truth about our reactions, we hurt both the results and our relationships with others.
The ability to engage in constructive conflict – focused on issues and expressed with respect – is a key hallmark of effective teams. And it makes sense. Openly airing different points of views and passionately testing ideas helps groups:
• Identify and adjust faulty assumptions,
• Eliminate or solve problems early, and
• Bring the broadest and best thinking to decisions.
“Conflict is what prevents all forms of stagnation and vulnerability from being overtaken by your competition.”
- Steven Berglas, consultant/clinical psychologist at Harvard Medical School
But beyond the business argument for constructive conflict, there’s a human one. It also builds relationships and teamwork. While it might seem counterintuitive, teams that engage in the most heated and intense conflicts are frequently the strongest. They know they can count on each other for absolute candor. They know that once the group makes a decision, everyone will own it and work toward its success. They know that whatever someone has to say will be shared in a forthright way that allows for the back-and-forth required to fully understand and respond to issues or concerns.
“Tumultuous meetings are of a sign of progress.”
- Patrick Lencioni
Are you and your team not realizing the benefits of constructive conflict? Here are three steps you can take today to start cultivating this critical team competency.
Do a Personal Gut Check
Check your own reaction to conflict and evaluate the effect it has on your team. Your mindset drives your behavior. If differences make you tense, team members will pick up on that. If you rush in to smooth over minor disagreements, others will quickly learn that conflict is not OK… and dysfunctional politeness may creep in.
Set Expectations and Ground Rules
Share what you know about the value of conflict and the role it can play in helping your team achieve excellence. Brainstorm agreements that keep conflict safe. Examples include: focus on issues and ideas but never people; use respectful language always; listen to understand the other point of view fully before speaking.
Model the Conflict You Want to See
Your own behavior is the most powerful leadership tool at your disposal. Others learn far more from what you do than what you say. So model effective conflict daily. Challenge ideas in a respectful and supportive way. Test assumptions with open-ended questions. Demonstrate high-quality listening and the courage to ask questions that stir up productive controversy.
“All polishing is done by friction.”
- Mary Parker Follett
What do you think…
How is dysfunctional politeness hurting your organization?
What does constructive conflict look like to you… and how do you promote it?
Art: www.dreamstime.com and Liz Price
Julie Winkle Giulioni
Julie Winkle Giulioni
We can offer effective content available, but if there is no motivation to learn, why bother? http://t.co/SwU5z0JY8N @HalogenSoftware - 2 hours ago
Julie Winkle Giulioni
Julie Winkle Giulioni
|
__label__1
| 0.838074
|
Ways to experiment with conferences
Yesterday I wrote about why I think technical conferences underdeliver. Coincidentally, Evan sent me this quote from Seth Godin's blog yesterday:
We've all been offered access to so many tools, so many valuable connections, so many committed people. What an opportunity.
What should we do about it?
If we are collectively spending 6 careers at the SEG Annual Meeting every autumn, as I asserted yesterday, let's put some of that cognitive surplus to work!
I suggest starting to experiment with our conferences. There are so many tools: unconferences, idea jams, hackdays, wikithons, and other participative activities. Anything to break up sitting in the dark watching 16 lectures a day, slamming coffee and cramming posters in between. Anything to get people not just talking and drinking, but working together. What a way to build collaborations, friendships, and trust. Connecting with humans, not business cards.
Unconvinced? consider which of these groups of people looks like they're learning, being productive, and having fun:
This year I've been to some random (for me) conferences — Science Online, Wikimania, and Strata. Here are some engaging, fun, and inspiring things happening in meetings of those communities:
• Speaker 'office hours' during the breaks so you can find them and ask questions.
• Self-selected topical discussion tables at lunch.
• Actual time for actual discussion after talks (no, really!).
• Cool giveaways: tattoos and stickers, funky notebooks, useful mobile apps, books, scientific toys.
• A chance to sit down and work with others — hackathons, co-writing, idea jams, and so on.
• Engaged, relevant, grounded social media presence, not more marketing.
• An art gallery, including graphics captured during sessions
• No posters! Those things epitomize the churn of one-way communication.
Come to our experiment!
Clearly there's no shortage of things to try. Converting a session here, a workshop there — it's easy to do something in a sandbox, alongside the traditional. And by 'easy', I mean uncertain, risky and uncomfortable. It will require a new kind of openness. I'm not certain of the outcome, but I am certain that it's worth doing.
On this note, a wonderful thing happened to us recently. We were — and still are — planning an unconference of our own (stay tuned for that). Then, quite unprovoked, Carmen Dumitrescu asked Evan if we'd like to chair a session at the Canada GeoConvention in May. And she invited us to 'do something different'. Perfect timing!
So — mark your calendar! GeoConvention, Calgary, May 2013. Something different.
The photo of the lecture, from the depressing point of view of the speaker, is licensed CC-BY-SA by Flickr user Pierre-Alain Dorange. The one of the unconference is licensed CC-BY-SA-NC by Flickr user aforgrave.
Are conferences failing you too?
I recently asked a big software company executive if big exhibitions are good marketing value. The reply:
It's not a waste of money. It's a colossal waste of money.
So that's a 'no'.
Is there a problem here?
Next week I'll be at the biggest exhibition (and conference) in our sector: the SEG Annual Meeting. Thousands of others will be there, but far more won’t. Clearly it’s not indispensable or unmissable. Indeed, it’s patently missable — I did just fine in my career as a geophysicist without ever going. Last year was my first time.
Is this just the nature of mass market conferences? Is the traditional academic format necessarily unremarkable? Do the technical societies try too hard to be all things to all people, and thereby miss the mark for everyone?
I don't know the answer to any of these questions, I can only speak for myself. I'm getting tired of conferences. Perhaps I've reached some new loop in the meandering of my career, or perhaps I'm just grumpy. But as I've started to whine, I'm finding more and more allies in my conviction that conferences aren't awesome.
What are conferences for?
• They make lots of money for the technical societies that organize them.
• A good way to do this is to provide marketing and sales opportunities for the exhibiting vendors.
• A good way to do this is to attract lots of scientists there, baiting with talks by all the awesomest ones.
• A good way to do this, apparently, is to hold it in Las Vegas.
But I don't think the conference format is great at any of these things, except possibly the first one. The vendors get prospects (that's what sales folk call people) that are only interested in toys and beer — they might be users, but they aren't really customers. The talks are samey and mostly not memorable (and you can only see 5% of them). Even the socializing is limited by the fact that the conference is gigantic and run on a tight schedule. And don't get me started on Las Vegas.
If we're going to take the trouble of flying 8000 people to Las Vegas, we had better have something remarkable to show for it. Do we? What do we get from this giant conference? By my conservative back-of-the-envelope calculation, we will burn through about 210 person-years of productivity in Las Vegas next week. That's about 6 careers' worth. Six! Are we as a community satisfied that we will produce 6 careers' worth of insight, creativity, and benefit?
You can probably tell that I am not convinced. Tomorrow, I will put away the wrecking ball of bellyaching, and offer some constructive ideas, and a promise. Meanwhile, if you have been to an amazing conference, or can describe one from your imagination, or think I'm just being a grouch — please use the comments below.
Map data ©2012 Google, INEGI, MapLink, Tele Atlas.
News of the month
Knowledge sharing
Agile stuff
N is for Nyquist
In yesterday's post, I covered a few ideas from Fourier analysis for synthesizing and processing information. It serves as a primer for the next letter in our A to Z blog series: N is for Nyquist.
In seismology, the goal is to propagate a broadband impulse into the subsurface, and measure the reflected wavetrain that returns from the series of rock boundaries. A question that concerns the seismic experiment is: What sample rate should I choose to adequately capture the information from all the sinusoids that comprise the waveform? Sampling is the capturing of discrete data points from the continuous analog signal — a necessary step in recording digital data. Oversample it, using too high a sample rate, and you might run out of disk space. Undersample it and your recording will suffer from aliasing.
What is aliasing?
Alaising is a phenomenon observed when the sample interval is not sufficiently brief to capture the higher range of frequencies in a signal. In order to avoid aliasing, each constituent frequency has to be sampled at least two times per wavelength. So the term Nyquist frequency is defined as half of the sampling frequency of a digital recording system. Nyquist has to be higher than all of the frequencies in the observed signal to allow perfect recontstruction of the signal from the samples.
Above Nyquist, the signal frequencies are not sampled twice per wavelength, and will experience a folding about Nyquist to low frequencies. So not obeying Nyquist gives a double blow, not only does it fail to record all the frequencies, the frequencies that you leave out actually destroy part of the frequencies you do record. Can you see this happening in the seismic reflection trace shown below? You may need to traverse back and forth between the time domain and frequency domain representation of this signal.
Seismic data is usually acquired with either a 4 millisecond sample interval (250 Hz sample rate) if you are offshore, or 2 millisecond sample interval (500 Hz) if you are on land. A recording system with a 250 Hz sample rate has a Nyquist frequency of 125 Hz. So information coming in above 150 Hz will wrap around or fold to 100 Hz, and so on.
It's important to note that the sampling rate of the recording system has nothing to do the native frequencies being observed. It turns out that most seismic acquisition systems are safe with Nyquist at 125 Hz, because seismic sources such as Vibroseis and dynamite don't send high frequencies very far; the earth filters and attenuates them out before they arrive at the receiver.
Space alias
Aliasing can happen in space, as well as in time. When the pixels in this image are larger than half the width of the bricks, we see these beautiful curved artifacts. In this case, the aliasing patterns are created by the very subtle perspective warping of the curved bricks across a regularly sampled grid of pixels. It creates a powerful illusion, a wonderful distortion of reality. The observations were not sampled at a high enough rate to adequately capture the nature of reality. Watch for this kind of thing on seismic records and sections. Spatial alaising.
Click for the full demonstration (or adjust your screen resolution).You may also have seen this dizzying illusion of an accelerating wheel that suddenly appears to change direction after it rotates faster than the sample rate of the video frames captured. The classic example is the wagon whel effect in old Western movies.
Aliasing is just one phenomenon to worry about when transmitting and processing geophysical signals. After-the-fact tricks like anti-aliasing filters are sometimes employed, but if you really care about recovering all the information that the earth is spitting out at you, you probably need to oversample. At least two times for the shortest wavelengths.
Hooray for Fourier!
The theory of truth is a series of truisms - J.L Austin
The mathematical notion that any periodic function, no matter how jagged or irregular, can be represented as a sum of sines — called a Fourier series — is one of the most extraordinarily useful ideas ever. Ever! It is responsible for the theory of transmitting and recovering information, and yes, is ubiquitious in geophysics. Strikingly, any signal can be decomposed into an ensemble of sine waves. They are two different representations of the same object, two equal representations of the same information. Fourier analysis is this act of sending waves through a mathematical prism, breaking up a function into the frequencies that compose it.
To build an arbitrary signal, the trick is to mulitply each of the sines by a coefficient (to change thier amplitude) and to shift them so that they either add together or cancel (changing the phase). From the respective coefficients and phases of the composite sinusoids, one can reconstruct the original curve: no information is lost in translating from one state to the other.
So the wiggle trace we plot of the seismic waveform has bits of information partitioned across each of its individual sinusoids. The more frequencies it has, the more information carrying capacity it has. Think of it as being able to paint with a full color palette. The degree of richess or range is known as bandwidth. In making this example, I was surprised how few sine waves (only ten) it took to make a signal that actually looks like a bonafide seismic trace.
In 52 Things You Should Know About Geophysics, Mostafa Nagizadeh wrote an essay on the magic of Fourier; it's applications for geophysics data analysis. And he should know. In tomorrow's post, I will elaborate on the practical and economical issues we encounter making discrete measurements of continuous (analog) phenomena.
|
__label__1
| 0.557151
|
No, thanks
Frequently Asked Questions about Certification
What is certification?
Certification has, as its primary purpose, the increased protection of the public by providing an objective measurement of standardized current knowledge recognized and respected within and outside the field of infection prevention and control.
Infection Preventionists (IPs) can demonstrate a mastery of this knowledge by taking and passing a comprehensive examination developed by APIC's independent credentialing arm, the Certification Board of Infection Control & Epidemiology (CBIC). IPs who are certified are authorized and encouraged to use the internationally recognized initials CIC after their names and in their titles.
Initial certification is good for five years after which successful completion of recertification exams extend certification at five-year intervals.
Why is certification important?
Certification represents an IP's and an institution's commitment to continual improvement of infection prevention and control functions and their contribution to healthcare and patient safety. The mission of CBIC is to protect the public through the development, administration, and promotion of an accredited certification in infection prevention and control. Safety of the public is essential to CBIC.
As an IP, certification reaffirms that through your study and hard work, you have an internationally recognized level of knowledge in the IC field. It gives you a sense of professional accomplishment.
It also signals to your employer and your colleagues that you are committed to professional growth in the field of infection prevention/control by keeping your knowledge and skills current to better your organization's IC function and its success.This recognition can be a factor in increasing your professional credibility. Data also show that the Joint Commission recognizes the professionalism of people with the CIC credential.
Is certification well established and well recognized?
The impetus for certification in IC started in 1977 because of the efforts of the New England Chapter of the Association for Practitioners in Infection Control (APIC). The chapter funded the initial project and it quickly caught on nationally.
The APIC Board of Directors formed a committee in 1978 to establish goals and methods and in 1980, the Board approved education standards for certification. Later that year, the APIC Certification Association (APICCA) was formed. The following year, the APIC Certification Committee and APICCA worked together to develop an independent certification board, contract with a professional testing company, conduct the first job analysis of infection control practice, determine eligibility criteria and develop a recertification plan.
In 1982, APICCA changed its name to the Certification Board of Infection Control (CBIC). The organization is now called the Certification Board for Infection Control & Epidemiology (still CBIC) to reflect current practice, which encompasses applied epidemiology.
The National Commission for Certifying Agencies (NCCA) accredits CBIC’s certification program, which signifies that CBIC has met the highest national voluntary standards for private certification. CBIC periodically conducts job analyses to assure that certification measures current practices and knowledge required for infection prevention and control and applied epidemiology.
How does the Association for Professionals in Infection Control and Epidemiology,
Inc. (APIC) and the Infection Prevention and Control (IPAC Canada/PCI Canada)
encourage certification?
APIC encourages all its members to become certified and continue qualifying for the CIC® credential by recertifying at the appropriate times. In reality, certification is a part of APIC's education program as it fosters continuing upgrading of IPs knowledge of infection prevention and control and epidemiology. APIC looks upon its members who earn the CIC® credential as having reached a significant milestone in their IP careers. Certification is an important step in an IP's potential to contribute to increased overall patient safety. A goal of 100% certification of qualified members is desired by APIC. IPAC Canada/PCI Canada is a national, multidisciplinary professional association for those engaged in the prevention and control of infections. IPAC Canada/PCI Canada is committed to the wellness and safety of Canadians by promoting best practice in infection prevention and control through education, standards, advocacy and consumer awareness.
Is it still recommended to wait 2 years to sit for the exam?
There is no specific time requirement that defines “sufficient experience”; however we emphasize that this certification examination is geared towards the infection preventionist who has had at least two years of full-time experience in infection prevention and control.
Where can I get the CBIC Candidate Handbook?
The candidate handbook is available for free online here.
What is the cost of the exam?
The cost of the initial exam (the Computer-Based Test or CBT) is $350. If re-certifying by CBT the cost is $325 (within the US) or $350 (to test outside the US). The SARE (Self-Achievement Recertification Exam) is $325.
Why is the SARE not offered for the initial exam?
The SARE is geared toward the advanced infection prevention and control re-certifier (who is, at minimum, a five-year practitioner), so some questions may be more difficult than those on the certification examination, which is geared toward a two-year practitioner. The purpose/goal of the SARE is to demonstrate continued knowledge mastery in the field of infection prevention and control.
Do I have to pay to take the exam if I do not pass the first time?
You are required to pay for each exam. If you do not pass the exam, you will need to wait 90 days before taking the exam again.
How is the CIC exam constructed?
New versions of the examination always exactly match the examination specifications to ensure an appropriate distribution related to the practice of infection prevention, control, and epidemiology. An item related to every task (or topic) identified by the practice analysis cannot be included on every examination; rather, items are selected to sample the domain of content. As noted previously, items are unanimously approved prior to pretesting, and they are again unanimously approved by the Test Committee before using the items on a scored portion of the examination.
CBIC doesn’t simply add and subtract questions (items) from an existing examination. CBIC maintains a bank of items that have been approved by the Test Committee and been subjected to pretesting. Using this item bank, Psychometrician and test development staff select draft examination forms with an appropriate distribution related to the practice of infection prevention, control, and epidemiology at a level of difficulty consistent with other examination forms. In addition to exactly matching a specified number of items in each major content area, test developers simultaneously consider several item selection rules. One requirement is that the collection of items on each form provides a consistent average p-value, or proportion correct, based on previously collected data on first time candidates. Matching this target p-value is an important first step in ensuring the comparability of examination forms, which is confirmed through statistical pre-equating of the forms. These procedures foster fairness and equivalency of test results, ensuring that all candidates have an equal opportunity to achieve a score on the examination that represents their level of knowledge, regardless of the particular form of the examination taken. When assembling the examinations, the test company and CBIC follow these procedures carefully, to ensure that the various versions of the examinations are as comparable as possible, both from a qualitative and quantitative perspective.
What is the best course of action to prepare for the certification exam?
CBIC highly suggests reviewing the content outline and list of references available in the candidate handbook. CBIC does not endorse any particular method of study or education, a lot of candidates find the APIC Certification Competency Review Course helpful. You can also study from the texts that are used to write the questions for the exam. Finally, many Chapters have study groups through which you can prepare with your peers. To see the CBIC webinar on Preparing for the Exam, please go here.
Does CBIC offer exam study materials?
CBIC does not offer study materials other than the practice exam, which can be purchased by visiting our website hereAPIC offers some study materials, but you will need to contact them directly and their website is
How much time is recommended to prepare for the exam when taking for the
first time?
Preparation depends on the amount of experience in infection prevention, as well as an individual’s learning style.
Are there sample questions available?
There are practice questions in the candidate handbook. CBIC has an online practice exam available for purchase as well.
Is the practice exam a helpful tool?
It is helpful to familiarize yourself with the format of the actual exam.
I am a nurse director in a community health facility and am seeking advice on
meeting qualifications because I am not hospital-based.
Those certified in infection control come from a variety of working environments, so it is important to review the practice requirements stated in the handbook or online to see if those are met in your current position. To see if you are eligible, use our online tool. To find out more information regarding the eligibility requirements, please review our Candidate Handbook here.
How do I find out where the exam is given in my area?
CBIC’s testing company assessment centers located throughout the US and Canada. Additional centers can be found internationally as well. A list of testing locations can be found by visiting Prometric's site here.
On which dates of the year is the exam offered?
There are no set testing dates (i.e. the exam isn’t given twice per year at specified locations). Our testing company has about 150 locations at which they administer the exam by computer. Once you register to take the exam, they will send you an email with available dates and times for you to take the exam at the location nearest you.
Do I receive my score immediately upon completion of the exam?
A score report is generated immediately upon completion for the both the CBT and the SARE exam.
How long after I pass the exam can I start using the CIC® credential?
Once you receive your score report indicating that you have passed the exam, you may begin using the CIC credential after your name and in your title immediately, but it takes approximately 4-6 weeks to receive your official certificate from the CBIC Executive Office.
Who can I contact to get a receipt for my exam?
For CBT and SARE receipts contact the CBIC Executive Office at 414.918.9796 or email
How can I get a replacement of my certificate?
To get a replacement certificate printed and mailed to you, please contact us at
If you need a new certificate due to damage during delivery or a misspelling, CBIC will be happy to send you a replacement.
How can I check my certification status?
You can check your certification status on CBIC’s online directory on the website here.
If I move and inform APIC and IPAC Canada/PCI Canada, do they automatically notify
No, you will also need to inform CBIC of any change of address or contact information. You can do so by going to the My Certification tab at and logging in to My Profile. If you need assistance with logging in, please contact
What is the pass rate of the CIC exam? What is the percentage of correct answers
needed to pass?
In 2013, 58% of those who took the CBT passed the exam. In 2013, 88% of those who took the SARE passed the exam.
When the initial form of an examination is developed following a job analysis, a criterion referenced passing point study is conducted. Such a study ensures that passing the examination depends on the amount of knowledge displayed, and does not depend on the other candidates taking the examination. In the passing point study, content experts develop a definition of an individual who should barely be able to pass the examination, sometimes called a minimally competent practitioner or a borderline expert. Following considerable discussion, training, and practice, the content experts provide a judgment about the difficulty of each item on an examination form for this borderline expert. The aggregation of these judgments provides an estimate of the number of correct answers that would likely be provided by the borderline expert, and therefore, an estimate of the most appropriate passing point for the examination. Since examination forms may vary slightly in difficulty, it may not be appropriate to require exactly the same number of correct answers to pass. This is why the passing score may be different for each version of the examination.
To hear additional information please listen to our podcast here.
Last updated: May 20, 2014
|
__label__1
| 0.980449
|
Global Semester: World Cultures
The study abroad program aims to balance study of the historical aspects of these societies with a more modern appreciation of cultural and societal differences. We are entering a modern era of globalization where the United States, Europe and Asia will play important and complementary roles.
By reflecting on the historical and cultural traditions that have built these societies, students develop a deeper appreciation of cultural similarities and differences. As the world becomes smaller and we interact more across cultures, the ability to adapt to and bridge these cultural differences becomes an increasingly important skill set.
Now accepting students for
Student Photos
|
__label__1
| 0.994608
|
The Forgotten Bouzouki
The Forgotten Bouzouki was formed in 1998 by members of the Greek community of Newfoundland and Labrador. Currently most of its members are local talents who love to play Greek music. Alison Corbett (Baglamas, Violin), Darren Browne (6-string Bouzouki, Baglamas, Mandolin), Dave Panting (8-string Bouzouki, Baglamas, Mandolin, Lute), George Miminis (Vocals, Acoustic Guitar), Heather Write (Violin, Viola), Holly Hogan (Vocals), Matthew Hender (Double Bass), and Simon Miminis (Drum kit, Hand Drums).
The Forgotten Bouzouki performs several genres of Greek music: traditional, island, ballads, folk and Rebetika. The latter is a type of Greek folk music that has been compared to Spanish Flamenco, Portuguese Fado and the American Blues. It speaks to similar subjects and has a similar vibe musically and emotionally, although it involves a more complex variety of rhythms and musical scales.
The Forgotten Bouzouki has been performing regularly at local festivals and venues; the band has been featured on several regional and national CBC radio programs and has always been known for its full orchestration and first-rate musicianship.
In 2010 The Forgotten Bouzouki got a grant from the Newfoundland and Labrador Folk Arts Council to record its first CD, which will be released in late summer, 2011.
|
__label__1
| 0.539295
|
Transmission refers to high voltage lines that bring power from generators to substations. From there, the power is stepped down in voltage and distributed to end use customers. Transmission lines usually run in dedicated rights of way and not along public roads.
From time to time, Maine utilities seek permission from the Maine Commission to build high voltage transmission lines. The question to be answered in such cases is whether the lines are "needed". Need usually means that without the line, customers would be exposed to blackouts at certain times of the year. In the some cases, the need is more difficult to quantify, since it is associated with renewable energy (like a wind farm) that would seek to sell to customers throughout New England. In such cases, the need element is usually satisfied by a showing that the generator has all necessary permits and will be built. In such a case, the generator could not deliver power to customers without the transmission line.
By statute, our job in such cases is to represent the "using and consuming" public, i.e. ratepayers as a group. We do not represent the interests of individual ratepayers or their unique concerns. We do, however, understand that transmission lines cause a great deal of upset to many who live near them. Our primary role on behalf of ratepayers is to advocate for the least cost way of providing reliable power. So, we balance cost with reliability. Generally, utilities use existing land rights (easements and fee ownership interests) for new transmission lines. In situations where many individuals live adjacent to these existing utility rights of way, we believe it is appropriate for these rights of way to be used by the utility if they prove the need for the line. It would be much more expensive to require the utility to buy up all the land rights necessary to create a whole new right of way, even though doing so might lessen the impact on those who live next to existing rights of way. Thus, we are very unlikely to become involved in questions about where these lines go.
Individuals may get involved, in several ways. First, people may intervene in the case as a full party. If they do this, they will receive virtually every piece of paper or electronic information filed in the case, including notice of all meetings, technical conferences, hearings and proceedings. In this case, people will have the option to submit substantive testimony about the technical aspects of the proposals, but there is no requirement to do so. Most of the "regular" parties do this through the use of expert witnesses. Short of this, people may request to be an "interested person" in which case you will receive notice of important developments and public hearings. Third, the PUC may hold public witness hearings; in these cases, it is likely that there will be one or more hearings in areas where the proposed line would be built. At these hearings, any person may testify on their views about the case. Finally, people may put their views in writing to the Commission.
A utility seeking permission to build a line must also obtain other permits. For example, the Maine Department of Environmental Protection (DEP) has jurisdiction over the environmental impacts caused by the line. The Public Advocate does not have the authority or expertise to participate in the DEP process.
Electromagnetic Fields (EMFs)
EMFs are electromagnetic fields, and are potentially emitted by anything that conducts electricity (including appliances in your home). Because transmission lines conduct high voltage electricity, they do emit EMFs. There has been much study of the effects of EMFs on humans (including studies of electric line workers), and to date there is no clear connection with human illness. There is, however, a "suggestion" that EMFs may contribute to childhood leukemia. If you live next to an existing line that will be upgraded, it is likely to lessen any current EMFs since the line will be bigger, dissipating the EMFs, and if the poles are higher, the line will be further away from you.
To learn more, recommend that you start with the following websites:
Transmission lines may or may not affect the value of property that abuts the line. We have seen arguments presented on both sides of these questions. In prior cases, the utilities have asserted that a new transmission line built next to a residence does not in fact negatively affect the value. Homeowners, on the other hand, have maintained that it does. The answer to this question likely depends on the unique circumstances of your particular location.
Finally, the utility may obtain permission from the Commission to take property by eminent domain.
What is Eminent Domain?
Eminent domain refers to the power possessed or delegated by the State to acquire private property for public use. Maine law authorizes utilities to acquire land using the power of eminent domain. The law provides for certain limitations to this right, for example a utility may not acquire land that is within 300 feet of an inhabited dwelling.
How does Eminent Domain Work?
There are several ways by which electric utilities can acquire land they need for building new transmission lines. Typically they approach the property owner and offer to buy the land they need. If the owner agrees, the sale takes place. If the owner does not agree, utilities may be able to take or condemn the property under the power of eminent domain. Typically, utilities only need an easement, but sometimes they seek full title.
How must a property owner be compensated for his or her land?
Under both the Maine and the United States' constitutions, the owner of land that is to be acquired must receive "just compensation" for his or her land. Just compensation means the sum of money that a willing buyer would pay a willing seller in a bargained for sale upon the open market. In some cases, the owner is entitled to additional compensation, for example, when only part of a parcel of land is taken, but the taking of that part makes the remaining part less valuable. For example, if a utility installs a large high voltage transmission line on a portion of the property, the landowner would be entitled to compensation for the loss of value of his or her remaining property as a result of the transmission line's presence.
What happens if the landowner and the company cannot agree on the amount of compensation?
If the landowner and the company cannot agree on the amount of compensation, either party may, within 3 years after the taking, petition the County Commissioners to determine the amount of compensation. Either party may appeal the decision of the Commissioners within 30 days to the Superior Court in the county where the property is located. An appeal from the Superior Court may be made to the Maine Supreme Court.
Must the Public Utilities Commission approve the transmission line before a utility may seek eminent domain approval?
Yes, the Public Utilities Commission must approve the transmission line before a utility may obtain land by eminent domain. Typically, the Commission must find that a "public need for the line exists." This determination often includes a finding by the Commission that there is no reasonable alternative that would better serve the public interest in having access to safe, reliable and economic electric energy. A utility must obtain this approval before it seeks eminent domain approval to take land necessary for the location of that line.
Must the Commission approve the location to be taken by eminent domain?
Yes. Once the Commission finds the line is necessary, it must, in a separate proceeding, approve the exact location of the land to be taken. The landowner has the right to participate in such a proceeding and may appeal the decision to the Maine Supreme Court.
How is property transferred by eminent domain?
Once the utility obtains the approval of the Commission to acquire the land by eminent domain, it must file a detailed description of the property and the names of the owners of the property with the county commissioners of the county where the property is located. The commissioners must note the time of the filing and then will order the utility to record the location of the property in the registry of deeds. Once this occurs, the utility takes the rights and may begin construction on the land. The only issue left for the landowner is compensation.
Is a landowner entitled to refuse the utility employees the right to come on his or her land prior to the land being acquired?
Yes. However it might be in the landowner's interest to allow access in order to help the company determine if that particular location is suitable for siting a transmission line.
Can land in a transmission line's right of way be used for other purposes?
When a utility acquires an easement right for a transmission line the owner can continue to use the land as long as the use does not interfere with the safe operation of the line. Golf courses, hiking trails, crop plantings and cattle pastures are examples of such uses. The landowner does not need permission to use the land as long as the use of the land does not interfere with the line.
This fact sheet is for general information purposes and does not constitute legal advice.
|
__label__1
| 0.970493
|
When the New World Order architects at the Council on Foreign Relations prattle about sovereignty, they mean something entirely different from independent nation-states.
The two leading contenders for the U.S. presidency are both members of Skull and Bones, one of the oldest secret societies in America. Why is this not a major election-year issue?
As a presidential hopeful, Senator John Kerry touts his military experience. But 30 years ago he led anti-war protests and marched alongside revolutionary Communists.
Log in
|
__label__1
| 0.915348
|
Tuesday, June 28, 2011
Why Mosquitoes
Why mosquitoes? Of all the amazing and beautiful rain forest animals to study, why would anyone want to work with this lowly, annoying bug that drives us crazy while sitting on porches on summer evenings? They spread disease, too. Why would anyone want to mess with that?
True. Mosquitoes can spread disease. That is itself a reason to study them. They have been responsible for countless deaths throughout the centuries and, sadly, continue to be responsible for millions today, mainly in the world’s tropical zones. Malaria alone causes nearly one million deaths each year.
As a student of biology, I have learned through my courses that the world’s “maneaters” and “creepy crawlies” often get a biased treatment from those that may not be so familiar with them. I hope to change that perspective a little bit. Yes…even the “lowly” mosquito gets a little love here.
I remember when it surprised me to learn that not all mosquitoes suck blood. Both males and females feed on plant juices and nectar. Given that they feed on nectar, they act as pollinators. Some may not feed at all. It is the female that takes in blood, and she does this to lay eggs. Blood provides iron and protein, which allows her to lay a batch of eggs larger than what would otherwise be possible on a diet of nectar alone. Of course, being a bloodsucker has its drawbacks – Bzzzz…SLAP! –, and many species of mosquito don’t take in blood at all. The mosquito genus Toxorhynchites includes unusually large mosquito species – none of which suck blood. Their larvae are actually predatory (unusual for mosquito larvae) and feed on other mosquito larvae, earning them the nickname, “mosquito hawk.” In fact, this behavior of mosquito larvae-eating has earned them the honor of being introduced into regions where the disease-carrying species, Aedes aegypti, lives.
My project asks two questions: What species are there? Where are they going? The first part is pretty straightforward, as I collect specimens around CICRA to get an idea of what mosquito diversity is in this area. So far, much of the diversity information comes from the areas around Iquitos, Peru, a city located in the northeastern section of the country. Being located in the southeastern portion of the country, CICRA is a good location to sample the diversity at the opposite end.
The “Where are they going?” portion will be tackled at the KU Natural History Museum after the specimens are identified and mounted for examination. All life forms require certain biological parameters for them to thrive (ie. temperature, rainfall, soil content, etc.) and the regions where these parameters exist can be mapped. This provides a picture of potential habitats for any species. We can then track how these parameters change in response to things like climate shifts and urbanization, and therefore the change in a species distribution. If we know that areas of a wet habitat will become dry in response to climate change, for example, we can track the potential shift in distribution of a species that requires a wet environment. As portions of the rain forest become urbanized – such as by the construction of the transatlantic highway – it affects the distributions of its inhabitants. This has additional consequences to human health in the case of disease-carrying mosquitoes, as an increased human presence means more opportunities for infection and for outbreaks to occur. Such outbreaks of diseases like yellow fever and malaria (mosquito-borne diseases once eradicated from Peru) have sprung up in recent years. These are reemerging diseases.
|
__label__1
| 0.887532
|
ORDR Programs
ORDR Programs
The Office of Rare Diseases Research aims to improve the lives of people with rare diseases by coordinating the following collaborative research efforts.
Bench-to-Bedside Awards
Rare diseases bench-to-bedside medical research projects designed to speed translation of promising laboratory discoveries into new medical treatments.
The Rare Diseases Clinical Research Network
A clinical research network supported by NIH Institutes and Centers and the ORDR.
Global Rare Diseases Patient Registry and Data Repository (GRDR)
Rare Diseases Human Biospecimens/Biorepositories (RD-HuB)
A searchable database of biospecimens collected, stored, and distributed by biorepositories in the United States and around the globe.
Undiagnosed Diseases Program
The Undiagnosed Diseases Program provides answers to patients with mysterious conditions that have long eluded diagnosis and advanced medical knowledge about rare and common diseases.
Locate healthcare providers and researchers who have knowledge of your condition.
Navigate the process of trying to obtain a diagnosis.
|
__label__1
| 0.975005
|
Neuroanatomy and Traumatic Brain Injury
The human brain is the most complex, mystifying, and elegant object in the known universe. Our brains are responsible for virtually every aspect of our functioning from controlling hair growth to the origins of the universe. The human brain is truly a remarkable organ. It is estimated that the human brain contains over 100 billion neurons and several times that number in supportive cells. Each neuron, in addition, assesses between 30,000 and 50,000 branches which connect to both itself and other neurons. Thus, in one cubic millimeter of particle tissues there are literally billions of synapses or connection points between neurons. Furthermore, to support this complex system of neuronal connections the vascular system must function at a highly complex level in order to supply oxygenated blood to each of the neuronal cells. Thus, the vascular system in the human brain and the neurons it serves form a complex and interrelated matrix of extremely delicate vessels. The sensitivity and complexity of such a system leaves one to easily comprehend the results of high velocity impact injury to such a delicate system. Any stretching, compression, twisting, or other physical forces to the brain have the potential to negatively impact these delicate, physical structures. And this does not even address the changes which take place at a metabolic or chemical level. As noted by Bigler (2001) in describing the complexity of the human brain and the effects of trauma on that structure, “complex systems achieve complex functions only with efficient, well integrated, and fast recruitment of constituent parts, followed by a rapid response. Anything that disrupts this complex system, even subtly, will render the system less efficient and prone to errors in processing and responding.”
To further expand on this concept let us look at the individual neuro cell. Each cell in the brain has a specified length, width, and breadth and is held in position by other cells. As such, consistent with the physical constraints inherent in any component, the cell has limited elasticity. In other words, as with almost anything, neuro cells are limited in the amount they can be stretched, twisted, rotated, or compressed before there is an associated negative result. And the human brain is subjected to such physical motion damage may be identified using neuroimaging techniques such as computerized tomography (ct), magnetic resonance (mr), single photon emission computed tomography (spect), and magneto encephalography (mag). It is important to remember, however, that the entire brain is affected by such physical forces. Thus, when a legion is identified by any of the above methods it is erroneous to conclude that the brain has been subjected to damage in only that area identified by the imaging study. Thus, damage to the brain is always beyond just the visually identified legion. In essence, brain injuries resulting from traumatic forces are often diffuse in nature rather than specific to localized areas. Differences in brain injury, thus, should be viewed on a continuum ranging from minimal damage to a few selected neurons to progressively greater damage involving more neuronal injury.
Diffuse axonal injury has been described as a term involving injury to the cerebrial white matter of the brain. Neurons are comprised of a cell body, an axon or long trunk, and dendrites or connective branches. DAI identifies injury to the axonal section of the neurons. Three levels of DAI have been identified. Grade 1 represents wide spread non-specific axonal damage without focal abnormalities. Grade 2 incorporates the injuries in grade 1 but also includes focal abnormalities. Grade 3 again assumes levels 1 and 2 and includes brain stem injury. Very mild DAI has been objectively identified on autopsy as a result of a trauma involving as little as 60 seconds recorded loss of consciousness. Onset of DAI occurs anywhere from 6 to 72 hours following injury. And delayed cell death can occur for as long as up to one month post injury. Researchers have suggested that neuronal death can continue to occur for up to 3 years post injury!
The brain has been found to be most vulnerable if it is moved laterally. That is, trauma that occurs from a side impact has been found to result in the greatest degree of wide spread axonal damage.
Three stages of axonal injury have been suggested. In stage 1 a rapidly stretched axon which does not tear can undergo biochemical changes that may be transient. Studies have found that a minimum of a 5% increase in axon length from its resting length is sufficient to produce a transient disruption of the membrane of the neuron. This results in the neuron being unable to fire. Neuronal function may fully return within minutes after such an injury. Stage 2 axonal injury results from a 5 to 10% increase in axonal length resulting in swelling and enlargement of the injured axon resulting in disruption of neuronal functioning. Stage 3 occurs with a 15% or greater stretching and results in a high likelihood of permanent damage. With such a level of injury the neuron is believed to be unable to self-repair. Stage 4 injury in which stretching is in excess of 20% of the resting length produces immediate and irreversible damage.
In addition to neuronal injury as a result of physical forces impacting the human brain, the vascular system can also be compromised given the delicate lattice work of blood vessels supplying the billions of neurons in the brain any injury to the vascular system resulting in damage to that system can have a profound impact on the ability of that system to deliver nutrients to neurons. Swelling and compromised blood flow drop resulting in a reduction of glucose and oxygen delivery below the need the energy demands of the neuronal cells. With such a drop in glucose and oxygen there is a corresponding metabolic response in the neuron. This finding has been demonstrated most readily with SPECT and MAG imaging. The result of reduced glucose and oxygen delivery to neurons results in neuronal death and can be demonstrated by reduced brain volume. Experimental studies of even mild TBI have demonstrated hemorrhagic contusions at the gray-white matter interface.
*** studies have found that mild cases of TBI which include simple concussions, typically do not demonstrate depictable abnormalities using traditional MR imaging techniques. This does not mean, however, that there is an absence of injury to the brain. In fact, a recent series of articles published in the Journal of the American Medical Association demonstrated that concussion can produce mild but persistent neurocognitive deficits despite the absence of complete cell death resulting from such injuries. It is considered that a concussion can result in a disruption in the “efficiency” of the neurofunctioning of the brain. This finding clashes with other researchers who have consistently found in their studies that persistent post-concussion symptomatology is more likely due to psychological rather than neurologic injury. It has been suggested by other researchers, however, that as greater sophistication develops in the area of neuroimaging that argument will be found to be untenable.
In conclusion, the complexity of the human brain cannot be understated and the extent to which that delicate structure can be negatively impacted as a result of trauma should not be minimized. Most confident assessing such injury should involve sophisticated neuroimaging techniques and neuropsychological and comprehensive and sophisticated neuropsychological testing conducted by a well-trained and experienced Neuropsychologist.
ImPACT Concussion Testing
Did you know that children and adolescents suffer over 3 million concussions in the U.S. annually, and that with each successive concussion the risk of serious injury to the brain increases?!! Doing everything you can now to protect your brain is crucial for your future. When you take this test you will have taken the first step in protecting your brain should you suffer a concussion during the next year.
Take the Test!
|
__label__1
| 0.950551
|
A series of apparently random dots are printed on a hinged panel. As the visitor slowly raises the panel toward eye level, a word begins to take shape. Projected onto a tilted screen and traced, the word becomes legible only when it is viewed at a shallow angle.
|
__label__1
| 0.608324
|
Skip to content
Video podcast - International migration to and from the UK, year ending September 2013
Released: 27 February 2014
Also in this release
Slide 1
This is a short video looking at patterns of long-term international migration to and from the United Kingdom, presenting the latest provisional estimates for the year ending September 2013.
Slide 2
This first chart shows patterns of immigration (that’s migrants arriving in to the UK for a period of 12 months or more), emigration (that’s migrants leaving the UK for 12 months or more), and net migration (the difference between immigration and emigration).
Immigration rose sharply during the late 1990s and early 2000s, reaching a peak of 596,000 in 2006. The latest provisional estimate showed that 532,000 migrants moved to the UK in the year ending September 2013.
Emigration has remained broadly steady over the last 40 years, albeit with a slight rise in the last 10 years reflecting rising immigration. The latest provisional estimate shows that 320,000 migrants emigrated from the UK in the year ending September 2013.
During the 1980s and early 1990s, net migration was at a relatively low level, but rose sharply after 1997. Latest provisional estimates show net migration was 212,000 for the year ending September 2013. This was an increase from 154,000 in the previous year. This means that the estimated increase is likely to reflect a real change in migration patterns.
Slide 3
This chart shows how the patterns of migration vary between EU citizens (not including British citizens) and non-EU citizens. Net migration of EU citizens reached a record high of 131,000 in the year ending September 2013, driven by increased levels of immigration and steady emigration.
By contrast net migration of non-EU citizens fell to 141,000 in the year ending September 2013, due to falling immigration alongside steady emigration.
Rising EU net migration and falling non-EU net migration means that these figures are now closer than they have been at any point over the last 30 years.
Slide 4
The two main reasons why migrants come to live in the UK are for work and study. Traditionally work has been the most common reason for migration, although study overtook work between 2009 and 2012. In the year ending September 2013, 218,000 migrants arrived for work compared to 176,000 migrants arriving to study. The other reasons for migration have remained fairly steady.
Slide 5
Let’s look at EU migration in more detail. The latest estimates from the International Passenger Survey show that in the year ending September 2013, 103,000 EU15 citizens, 65,000 EU8 citizens and 24,000 EU2 citizens migrated to the UK. Immigration of EU15 and EU2 citizens have shown a statistically significant increase relative to the previous year, whilst immigration of EU8 citizens has remained relatively steady compared to the previous year. 6 in every 10 migrants from the EU15 arrived for work, compared to 7 in every 10 migrants from the EU8 and the EU2 arriving for work.
Slide 6
Every person who works in the UK requires a National Insurance Number, or NINO for short. The most common overseas nationality whose citizens had the most new NINo numbers allocated to them in 2013 was Poland, followed by Spain and Italy. These nationalities saw a rise in NINo registrations of 39%, 36% and 66% respectively relative to the number of registrations in 2012.
Source: Office for National Statistics
Background notes
Content from the Office for National Statistics.
© Crown Copyright applies unless otherwise stated.
|
__label__1
| 0.661218
|
Latest Hymenoptera Stories
2010-03-24 08:29:17
Who's in charge? Who's got food? The brain region responsible for learning and memory is bigger in social bee queens who may have to address these questions than in solitary queens, report scientists at the Smithsonian Tropical Research Institute who study the tropical sweat bee species, Megalopta genalis in Panama. Their study is the first comparison of the brain sizes of social and non-social individuals of the same species. "The idea is that to maintain power and control in groups you need...
2010-03-09 11:05:56
Desert ants perceive odor maps in stereo and use this information for navigation Scientists of the Max Planck Institute for Chemical Ecology in Jena have investigated another navigational skill of desert ants. These ants are already well-known for their remarkable visual orientation: they use a sun compass along with a step counter and visible landmarks to locate their nest after foraging for food. After the research team from Jena recently discovered that these ants also use olfactory cues...
2010-02-18 09:25:13
Research on why early termite offspring remained home with their parents, instead of leaving to create their own colonies, could provide a missing link to the evolution of sterility among social insects Natural selection argues for small biological changes that yield greater chances of survival and successful reproduction. Yet, that process does not square well with the evolution of social insects, particularly when their colonies can have over a million non-reproductive members. A new study...
2010-01-29 09:45:00
Going about their day-to-day business, bees have no need to be able to recognize human faces. Yet in 2005, when Adrian Dyer from Monash University trained the fascinating insects to associate pictures of human faces with tasty sugar snacks, they seemed to be able to do just that. But Martin Giurfa from the Universit© de Toulouse, France, suspected that that the bees weren't learning to recognize people. 'Because the insects were rewarded with a drop of sugar when they chose human...
2010-01-15 09:04:30
2009-12-23 15:55:00
Landing is tricky: hit the ground too fast and you will crash and burn; too slow and you may stall and fall. Bees manage their approach by monitoring the speed of images moving across their eyes. By slowing so that the speed of the looming landing pad's image on the retina remains constant, bees manage to control their approach. But what happens in the final few moments before touch down? And how do bees adapt to landing on surfaces ranging from the horizontal to upside-down ceilings? Flies...
2009-12-01 14:19:18
Broadly speaking, ants have two different feeding strategies. A large proportion of all species are "carnivorous," meaning that they are generalist predators feeding on other small animals or scavenging on their remains. Some, however, are "herbivorous". This is not to say that they only eat plants; rather, the bulk of their diets consist of plant-derived matter. For example, some forage on sticky fluids produced by plants to attract ants, called extra-floral nectar; others feed on the...
2009-11-18 07:36:18
Student field crews study the ecological power of ants in Central America under the guidance of biologist John Longino "This work will be physically demanding. You will need to carry bulky sampling supplies into rugged terrain. Some sites may be swelteringly hot, others cold and rainy. You will need to move off trails into dense forested habitats. Long hikes may be required ... There will be mud and mosquitoes." Although a hard-labor camp could be a reasonable match for that description, in...
2009-10-06 08:10:00
Evolution of sterility potentially explained among social insects Staying at home may have given the very first termite youngsters the best opportunity to rule the colony when their parents were killed by their neighbors. This is according to new research supported by the National Science Foundation and published today in the Proceedings of the National Academy of Sciences. Researchers say the incentive to remain home with siblings and inherit the parents' estate could be the missing link to...
2009-09-26 09:48:15
In the never-ending battle to protect computer networks from intruders, security experts are deploying a new defense modeled after one of nature's hardiest creatures "” the ant. Unlike traditional security devices, which are static, these "digital ants" wander through computer networks looking for threats, such as "computer worms" "” self-replicating programs designed to steal information or facilitate unauthorized use of machines. When a digital ant detects a threat, it doesn't...
Latest Hymenoptera Reference Libraries
Jack Jumper Ant, Myrmecia pilosula
2013-07-10 13:00:54
The jack jumper ant (Myrmecia pilosula), known by other names including the jumping jack or hopper ant, is a species of bull ant that can be found in Australia. Its range includes Tasmania, New South Wales, and rural areas of Victoria. This species is unique in that its genome only holds on set of chromosomes, which is the lowest number of chromosomes that any animal can hold. Like other bull ants, this species can build nests under rocks or under dirt mounds. The jack jumper reaches an...
Inchman, Myrmecia forficate
2013-07-10 12:28:46
The inchman (Myrmecia forficate) is a species of bull ant that can be found in Australia, in a range that includes Tasmania and possibly southeastern areas of Australia. This species is gregarious, living in colonies like most other ant species, but it forages for food alone. Nests often go unseen and are typically found under rocks. It reaches an average body length of up to one inch long, the trait from which it received its common name. The inchman is both a scavenger and a...
2005-09-12 11:56:41
A wasp is any insect of the order Hymenoptera and suborder Apocrita that is not a bee, sawfly, or an ant. The less familiar suborder Symphyta includes the sawflies and wood wasps, which differ from the Apocrita by having a broad connection between the thorax and abdomen. Also, Symphyta larvae are mostly herbivorous and "caterpillarlike", whereas those of Apocrita are largely predatory or parasitic. Most familiar wasps belong to the Aculeata, a division of the Apocrita whose ovipositors are...
2005-09-09 09:51:50
The Bombyliids are a large family of flies with hundreds of genera. Their life cycles are not well known. Adults generally feed on nectar and pollen, thus are pollinators of flowers. They superficially resemble bees, thus are commonly called bee flies, and this may offer the adults some protection from predators. The larval stage are predators or parasitoids of other insect eggs and larvae. The adult females usually deposit eggs in the vicinity of possible hosts, quite often in the burrows...
2005-09-09 09:43:40
The bumblebee is a flying insect of the genus Bombus in the family Apidae and a relative of the common honeybee. The bumblebee feeds on nectar and gathers pollen to feed its young. They are beneficial to humans and the plant world alike, and tend to be larger than other members of the bee family. Most bumblebee species are gentle. From this comes their original name: "Humblebee". Bumblebees are social insects that are known for their black and yellow striped bodies, a commonality among the...
More Articles (16 articles) »
Word of the Day
|
__label__1
| 0.510046
|
Jack and the Great Cliff
Jack a young lemming living in the tundra wants to explore the world. Being at the top of every predators menu, he is limited to his immediate surroundings. He accidentally befriends a falcon named Thor that helps Jack discover a sinister secret kept among the elders of his clan. Together they embark on an adventure to save the lives of his fellow lemmings. More
This book has not yet been reviewed.
Report this book
|
__label__1
| 0.999419
|
Reblogged from miquiztli-mazatl 90 notes
The 3rd and 4th logs were notched and set into place.
The notching is done with a log scribe, axe, and gouge. They are concave to produce a tightly fitting edge that both sheds water and tightens over time. Each notch looks like a unique hand carved bowl…
|
__label__1
| 0.934353
|
In the Beginning We MisunderstoodMost books dealing with the proper interpretation of Genesis 1 attempt to do one of two things: show how Genesis 1 cannot be reconciled with modern science, or show how Genesis 1 can be reconciled with modern science. Some try to show that Genesis presents us with a young universe, while others try to show that Genesis presents us with an old universe. Either way, it is presumed that Genesis 1 intends to present us with a scientific description of how God created (order, duration, etc.).
In their new book, In the Beginning…We Misunderstood: Interpreting Genesis 1 in Its Original Context, coauthors Johnny Miller and John Soden argue that this presumption is false, and concordism is a misguided hermeneutical approach to Genesis 1. Discussions over the meaning of Genesis should not be driven by scientific questions, but by literary questions. Our interpretation of Genesis should not be determined by our views about science, but by the text itself. Why even think that God meant to provide a scientific description of creation? The most important question to ask is what Moses meant when he wrote the creation account, how his readers would have understood it, and what practical impact it would have for them given their unique historical situation. How did it prepare them for the theology and religious practices they were familiar with in Egypt, as well as those they would encounter in Canaan?
Glass SlipperIf we are honest with ourselves, all of us want the Bible to support our existing beliefs and practices. We want it to support the teachings of the religious tradition we were raised in, or are currently part of. We want it to affirm that which we think is morally right, and condemn that which we think is morally wrong. There is always a danger, then, that we will engage in hermeneutical and logical gymnastics to ensure that we can walk away from the Bible without having to change our beliefs and practices.
I often ask myself, Would I interpret this passage in this way if I had been raised in a different tradition? Would I think X is wrong or Y is right if I was Presbyterian rather than Pentecostal? Are my reasons for interpreting the Bible as I do good enough to rationally compel others to adopt my position, or just good enough to for me to feel justified in my present beliefs? Would I adopt my position if I were an outsider, listening to the same arguments? If not, why not?
While I fully understand the desire to avoid change and theological conflict with one’s religious community, truth should always be our first priority. If good hermeneutics and sound reason cause us to walk away from the Bible confirmed in our present beliefs, then great. But if good hermeneutics and sound reason require us to change our beliefs and/or practices, then so be it. Truth is more valuable than tradition.
Portions of 1 John 4:1-6 are often cited in discussions of spiritual warfare. John’s admonition to “test the spirits to see whether they are from God” (1 Jn 4:1) is cited as evidence that we need to exercise spiritual discernment to distinguish between angelic and demonic spirits, or even good and bad human spirits. And then there is 1 John 4:4b: “Greater is he who is in you than he who is in the world.” This Scripture is typically quoted in the context of overcoming the Devil. But are these passages being interpreted correctly? Are they referring to spiritual warfare? To find out, let’s look at the context:
A key word in this passage is “spirit.” Many presume that when John talks about “test[ing] the spirits,” he is referring to angelic and demonic beings. It’s clear, however, that John uses “spirit” in several ways in this passage. And in verse one he uses “spirit” to refer to human teachers, not angels and demons. This is evidenced by his juxtaposition of “spirits” with “false prophets” who “have gone out into the world.”
Philippians 4:13 reads “I can do all things through Christ who strengthens me.” This is taken by many to mean they can do anything they set their mind to through Christ’s strength.
NT scholar Ben Witherington argues that this is a misreading of the text. He notes that the Greek does not say “do.” The only verb in the Greek is “ischuo” which means “to be able, strong, healthy, valid, powerful.” A literal rendering of the verse is “I am able all things in Him who empowers me.” Read literally, it doesn’t make any sense. Able to what? The helping verb is missing, and can only be supplied by the surrounding context. So what is the context of Paul’s statement?
In verses 10-12 Paul wrote: “I rejoiced in the Lord greatly that now at length you have revived your concern for me. You were indeed concerned for me, but you had no opportunity. [11] Not that I am speaking of being in need, for I have learned in whatever situation I am to be content. [12] I know how to be brought low, and I know how to abound. In any and every circumstance, I have learned the secret of facing plenty and hunger, abundance and need.” (ESV).
Paul had learned to be content in any state he found himself in. He learned to endure both the good and the bad through Christ’s empowerment. A better translation of Phil 4:13 then would be, “I am able [to be content in] all things in Him who empowers me” or “I am able [to endure] all things in Him who empowers me.” This verse affirms our ability to persevere through the good and the bad by trusting in Christ, not our ability to accomplish any feat we want.
If you are a Christian theologian or teacher, or just a serious student of Scripture, you will engage in word studies. This can be a very fruitful enterprise in exegesis, and yet there are so many ways it can go badly. In his book, Biblical Words and Their Meaning: An Introduction to Lexical Semantics, Moises Silva addresses the subject of lexical semantics. He discusses the proper study of words, and common fallacies to avoid. This book is a must read for exegetes. Here are just some of the gems I have gleaned from Silva:
• Language and concepts are not necessarily correlated. For example, just because Hebrew lacks a future tense does not mean Hebrew-speakers lack a concept of the future. All talk of the “Hebrew mind” versus the “Greek mind,” based on linguistic differences, is simply fallacious. Linguistics cannot tell us about a person’s worldview and mental categories.
• Etymological studies and cognate languages are of limited value to exegesis. The history of a word’s meaning may be of interest if you are a historian, but it is of little value if you want to know what that word means in the Biblical text you are studying. To determine the meaning of a word used in the Biblical text, we must determine what it meant in the author’s day (synchronic meaning), not its origin and evolution (diachronic meaning). (more…)
What do you think of the pericope of the rich man and Lazarus in Luke 16? Do you think it is a parable or a historical event? Why?
Jesus’ words here have been interpreted by many to mean vocalized prayers in public settings should be avoided. The only acceptable form of prayer in a public setting is silent prayer. Is this what Jesus meant? No, as Biblical examples of prayer make clear.
The first thing to observe is that Jesus went on to instruct the disciples how they should pray. He told them they should say, “Our Father, who is in heaven…” (6:9) Jesus’ use of the plural possessive implies that this prayer would be prayed aloud in a community setting. There would be no need for a single person praying alone, or a single person praying silently in a group to use “our.” In both cases “my Father” would be more appropriate.
Christians are often accused of being judgmental by non-Christians—and sometimes, even by fellow-Christians. Indeed, it’s not uncommon to even hear non-Christians quote Jesus’ words in Matthew 7:1 against Christians: “Judge not, lest you be judged.” (even if they’ve never read a page from the Bible in their life!) I am persuaded that both the church and the culture at large have failed to understand the Biblical teaching on judgmentalism. Before I explain, let’s look at a few more Biblical passages often cited in support of non-judgmentalism:
1 Cor 5:12-13 For what have I to do with judging outsiders? Is it not those inside the church whom you are to judge? 13 God judges those outside. “Purge the evil person from among you.” (ESV) [talking about executing punishment]
The Bible begins with one of the most famous proclamations of all time: “In the beginning God created the heavens and the earth” (Genesis 1:1). Theologians have historically understood “in the beginning” to refer to the very beginning of time itself. It was the boundary between timeless eternity and temporality.
Fast forward to the first century A.D. John opens his gospel about Jesus Christ with these words: “In the beginning was the Word, and the Word was with God, and the Word was God. 2 He was in the beginning with God. 3 All things were made through him, and without him was not any thing made that was made.” The resemblance to Genesis is unmistakable. Both Moses and John begin their work with “in the beginning,” and both speak of the creative word of God.
The question arises as to whether John is using “in the beginning” in the same way as Moses. For Moses it referred to the beginning of time and creation, but that’s how John is using it, then to say the Word was “in the beginning” seems to imply that the Word was not eternal, but a created entity who began to exist concomitantly with the created realm. Clearly this cannot be the correct interpretation because John 1:1 identifies the Word as being God (whom we know is eternal, and thus existed “prior to” the universe), and John 1:3 identifies the Word as the uncreated creator. Why, then, would John say the Word was “in the beginning?” Why not say Jesus was “before the beginning” or “before the ages?” What is your take on the matter?
There is a doctrine that has circulated within my fellowship for many years called the Shekel and a Half doctrine. Those espousing to this doctrine claim that in addition to paying tithes on ones income (10%), believers need to pay an additional 5%. It is often said that the additional 5% is for the upkeep of the church, or to fund a church building program. Exodus 30:11-16 is appealed to for Biblical support:
The Lord spoke to Moses: 12 “When you take a census of the Israelites according to their number, then each man is to pay a ransom for his life to the Lord when you number them, so that there will be no plague among them when you number them. 13 Everyone who crosses over to those who are numbered is to pay this: a half shekel according to the shekel of the sanctuary (a shekel weighs twenty gerahs). The half shekel is to be an offering to the Lord. 14 Everyone who crosses over to those numbered, from twenty years old and up, is to pay an offering to the Lord. 15 The rich are not to increase it, and the poor are not to pay less than the half shekel when giving the offering of the Lord, to make atonement for your lives. 16 You are to receive the atonement money from the Israelites and give it for the service of the tent of meeting. It will be a memorial for the Israelites before the Lord, to make atonement for your lives.”
I was having a conversation with some coworkers some time ago in regards to same-sex marriage. They brought up the relationship of homosexuality to the Christian religion, at which point I affirmed that the Bible—and hence Christianity—is opposed to homosexuality. Immediately I received the “Well, that’s just your interpretation” response. My response to this charge was to explain the process of exegesis, which took several minutes of my time and got us off the real issue at hand. In retrospect I thought of a more efficient and tactful response I would like to share with you.
The next time you are discussing some aspect of Biblical teaching with someone, and they give you the “Well, that’s just your interpretation” response, respond by saying something off-the-wall like, “So you are saying I don’t like pickles?!” A blank and confused stare is sure to follow proceeded by the expected question: “What?!?!” Explain to them that you have just demonstrated the fundamental principle of interpretation. Valid interpretation only comes about when the receiver accurately understands the intent of the sender/author. This is accomplished by correctly employing the use of grammatical and semantic rules, and considering the cultural/historical perspective of the sender. If the sender’s intent is not properly understood, communication has not occurred and the result is misinterpretation. If interpretation is rooted in authorial intent only one interpretation can be valid. As long as the interpreter employs the proper tools they can walk away with the correct interpretation.
The Bible is no different. There is a correct way and an incorrect way to interpret the Bible. The same tools and rules we use to correctly interpret our modern conversations and writings apply equally to the Bible. When those tools and rules are used properly the interpretation we walk away with is sound. No, it’s not just our interpretation. It is the meaning inherent within the text itself, discovered (not invented) by the interpreter using the universal rules and tools of language.
Elaine Pagels—famous for her promotion of Gnostic Christianity—was interviewed by David Ian Miller for the April 2, 2007 edition of the San Francisco Chronicle. Pagels was discussing the Gospel of Judas. Miller asked her if this gospel would change the way people observe Easter. Pagels answered in the affirmative. She wrongly asserted that Luke and John give different portrayals of Jesus’ resurrection body (one spiritual, one physical), and then went on to say the following:
And what was important to the authors of Luke and John was not to decide between those stories—the important thing is that we know in some sense that he is alive. That the resurrection happened. And that is affirmed. But one thing we can see in these other texts [such as the Gospel of Judas] is that you don’t have to take the resurrection literally to take it seriously. One can speak about Jesus alive after his death with conviction without necessarily meaning that his physical body got out of the grave.
Yes, we could speak of Jesus being alive after His death without meaning His body got out of the grave, but we could not call it a resurrection. Resurrection, like apple, refers to something specific. It does not refer to any sort of life after death, but in the words of N.T. Wright, life after life after death. In the ancient world the word was always bound up with the return to a bodily existence after a disembodied existence following death. We are not free to redefine words to our own fancy, no matter how much Pagels might wish to do so. If Pagels wants to believe in a spiritual ascension she is free to do so, but she is not free to call it a resurrection, nor is she free to say that those who believe such a thing have satisfied the Biblical requirement to believe in Jesus’ resurrection. You can’t evacuate a term of its meaning, and then assert that any content one might choose in its place satisfies the meaning of the word.
If resurrection can mean whatever one wants it to mean, then why is it important that we affirm it? And what are we even affirming? How about I postulate that Jesus’ resurrection means He survived death only in the memory of His followers? Is that an affirmation of His resurrection? Hardly. “Resurrection” means something.
A spiritual resurrection of Jesus makes no sense. It could not explain the rise of Christianity. If Jesus’ spirit merely survived death, there would be nothing extraordinary about Him. Other people experience the same. What made Jesus extraordinary was that His physical body came back to life, and was subsequently glorified. That is what the early church preached, and that is why Christianity was so scandalous. No pagan would have had a problem with a disembodied spirit ascending to heaven, but they had a big problem with a man returning from the dead, never to taste of death again.
But that’s all icing on the cake. My real focus is on her statement that we can take the Biblical texts seriously without taking them literally. While this is a nice sounding catchphrase that is popular in liberal Christianity, what exactly does this mean, and how does it play itself out in the real world? If the context makes it clear that a text is figurative in nature, then we are taking the text seriously when we understand it in a figurative sense. But when the context gives us every reason to believe the author is presenting something as historical fact, we are not taking the text seriously if we assign it a figurative meaning. When it comes to the gospels, we have every reason to believe that the events recorded are intended as genuine historical events. As such, it is impossible to take them seriously all the while denying their historicity.
Is Pagels prepared to treat other purported historical accounts in this fashion? Can she deny the historicity of slave trade in the early Americas while taking the texts that tell us about this horrendous practice seriously? Of course not! So why treat the Bible any differently? She is free to argue that while the gospels present themselves as genuine history, they are not historical events, but she is not free to deny their historicity all the while claiming to take the texts seriously. It is highly disingenuous.
Get every new post delivered to your Inbox.
Join 313 other followers
|
__label__1
| 0.629595
|
3D Construction Instructions
Universal language work instructions
Construction tasks performed on the field are often far from lean. They oblige site managers to deal with setbacks resulting from poorly executed project schedules. They also struggle with inconsistent work quality resulting from differences in the skill sets of the various work teams on site. Moreover, construction workers do not all speak the same language resulting in difficulties communicating instructions to them.
With Optimized Plant Construction 3DEXPERIENCE solution, non-textual, easily understandable 3D instructions can be obtained based on 3D information of the equipment, terrain, and plant facility. Instructions of generic operations can also be easily and quickly created in 3D. Animations of workers’ tasks are then interactively generated. Optimized Plant Construction 3DEXPERIENCE solution delivers virtual animated scenarios to train workers in a 3D life-like manner maximizing comprehension before real-life execution on the field.
Companies generally create instruction manuals in several languages filled with a lot of text and 2D sketches. The documents can, however, be easily transformed into 3D scenarios for any worker. Sensitive specific installation assembly sequences of the erection process can be transmitted to the construction team before actual execution so as to ensure that they do it right the first time.
Key Capabilities and Benefits:
• Promote first-time-right construction tasks
• Provide field teams with direct access to instruction procedures and training material.
• Unambiguous construction instruction
• Multilingual understanding & learning retention
• Stakeholders maximized comprehension of project phases
|
__label__1
| 0.877616
|
Ma’di, Southern
A language of Uganda
Alternate Names
Southern Ma’di
60,000 (2010 SIL), increasing.
West Nile river bank, Arua District, Madi-Okollo county, extending into Yumbe, Maracha, and Nebbi districts.
Language Maps
Language Status
6a (Vigorous).
Ogoko, Okollo, Rigbo. Reportedly more similar to Lugbara [lgg] than to Ma’di (Moyo) [mhi], which they do not understand. Ogoko and Rigbo dialects are more similar to Lugbara [lgg] than Okollo; intelligibility testing needed. Okollo considered most pure. Southern Ma’di dialects in Rigbo, Ogoko, and Okollo areas, should be considered Lugbara dialects (SIL 1992 Moru-Ma’di Survey Report). Lexical similarity: 85% between Ogoko dialect and Adjumani Ma’di [mhi], 83% between Okollo and Ogoko, 80% between Ogoko and Arua Lugbara, 80% between Ogoko and Moyo Ma’di, 78% between Ogoko and Moyo Ma’di, 76% between Okollo dialect and Arua Lugbara [lgg], 64% between Okollo and Moyo Ma’di, 59% between Okollo and Adjumani Ma’di [mhi] (Boone and Watson 1999).
Language Use
Home, work, markets. All ages. Positive attitudes. Also use English [eng], Lugbara [lgg], Swahili [swh].
Language Development
Taught in primary schools. Poetry.
Unwritten [Qaax].
Other Comments
|
__label__1
| 0.999301
|
Legislative Teacher Resources
Find Legislative educational ideas and activities
Showing 141 - 160 of 892 resources
Learners examine how citizens can influence legislation. They watch a video, develop a list of how citizens can influence legislation, answer video discussion questions, conduct Internet research, and write a recommendation for change to the No Child Left Behind Act.
Students examine the historical background of Supreme Court decisions and the basic principles behind legislation. As part of the instructional activity, students discover legal concepts and terms and write sentences using the vocabulary they have discussed.
Learners examine the roles of each of the branches of U.S. government. In this checks and balances lesson, students watch Discovery video segments and discuss the concept of federalism as they create a school-wide policy for government which affords specific powers to individual classrooms.
Students gain an introductory into the branches of government. Students research all parts of government and use Frames to create a public service announcement to teach others the parts of government and how they work.
Student demonstrate understanding of both sides of the argument between Jefferson and Marshall that led to the strengthening of the Judicial Branch through the creation of judicial review. Unit is comprised of five lessons and fits into the larger unit of study on the creation and development of the three branches of government in the United States.
Students explore the role of President of the United States. In this executive branch lesson, students play an online game that requires them to consider the needs of Americans as they act as president.
Students explore the role of state government. In this civics lesson, students play an online game that requires them to consider the needs of state residents and the structure of state government.
Students study our framework for government and examine the actual document ans see its direct impact on their lives. Groups act as a branch of government and role play the powers granted to them in Articles I, II, or III of the Constitution.
Fourth graders participate in a game in that helps them review the branches of government
High schoolers examine the general concept of representative democracy, and compare/contrast the American representative democracy to the monarchical system. They research the role of legislative bodies in serving the government, particularly in Nebraska.
Students study the powers and limitations of the three branches of the American government. They explain how the system of "checks and balances" protects the individual citizens. They explain how the amendments to the Constitution function today.
Eighth graders explore and explain the responsibilities and limits of our national system of government. After reading various selections documenting the viewpoints of the federalists and anti-federalists and the separation of power, 8th graders give explanations as to why our division of power in the government is appropriate.
Twelfth graders explore the functions of the Federal Court System. In this Judicial Branch lesson plan, 12th graders examine the needs for courts as they discuss justice and rights, read an excerpt from Hamilton's Federalist Papers and complete the provided handout.
Jeopardy games are great ways for students to review concepts in an interesting way. This Game covers the Amendments, 3 Branches of US Government, and miscellaneous terms related to American independence and law.
Here is a phenomenal lesson on the three branches of government for your second and third-graders. It presents this often-confusing information in an easy-to-understand format. Many excellent activities and worksheets are embedded in the plan, including coloring in the reverse side of the South Dakota State Quarter and identifying the four famous faces on Mt. Rushmore.
Eighth graders explore the processes, purpose and components of a good and just constitution. They focus on the Constitution of the United States of America. Students discuss the purpose of a constitution and reasons why the Constitution of the United States of America was written. They create their own constitution.
Pupils create a "Who's Who" compilation of local, state, national and international leaders that advocate, introduce legislation, and lobby for the deaf. They use internet research to create a catalog of biographies and then conduct a correspondence with one of the leaders. The results from the project are presented in a Power Point slide show for community members.
|
__label__1
| 0.770513
|
Nuclear Power
Nuclear energy is a clean, safe way to make electricity. It does not burn any fuel like coal so there are no pollutants released into the air.
Nuclear energy is energy that is stored in the nucleus or center core of an atom. The nucleus of an atom is made of tiny particles of protons (+ positive charge) and neutrons (no charge). The electrons(- negative charge) move around the nucleus. Nuclear energy is the force that holds the nucleus together in an atom.
How it works
In order to use this energy, it has to be released from the atom. There are two ways to free the energy inside the atom.
1. Fusion
Fusion is a way of combining the atoms to make a new atom.
For example, the energy from the sun is produced by fusion. Inside the sun, hydrogen atoms are combined to make helium. Helium doesn't need that much energy to hold it together, so the extra energy produced is released as heat and light.
2. Fission
Fission is a way of splitting an atom into two smaller atoms. The two smaller atoms don't need as much energy to hold them together as the larger atom, so the extra energy is released as heat and radiation.
Nuclear power plants use fission to make electricity. By splitting uranium atoms into two smaller atoms, the extra energy is released as heat. Uranium is a mineral rock, a very dense metal found in the ground and it is non-renewable. Non-renewable means we cannot make more of the substance. Currently, it is a cheap and plentiful fuel source. Power plants use the heat given off during fission to generate electricity.
Fission creates heat which is used to boil water into steam inside a reactor. The steam then turns huge turbines that drive generators that make electricity. The steam is then changed back into water and cooled down in a cooling tower. The water can then be used over and over again.
|
__label__1
| 0.508619
|
Guest Article #13
Frozen seeds - safeguarding global food supplies
World population grows and, thus, the demand for food. At the same time, climate change poses a threat to food supplies, particularly in poorer parts of the world. Subsistence crops are vulnerable to, amongst other things, desertification, temperature increases, changes in rainfall patterns and flooding, i.e. phenomena that are expected to become more frequent and intense as a result of climate change.
Through the proper conservation and utilization of genetic material the world will be better prepared to adjust food production to new climate conditions. With the help of genetic diversity we can develop new varieties of crops that are able to withstand more extreme climate conditions.
It is primarily the responsibility of the developed world to combat threats posed by our changing climate. The Nordic countries have put in place a range of measures to tackle the situation, including the creation of a global seed bank and efforts to promote similar gene banks in Africa and Central Asia. One key Nordic objective is to safeguard global food supplies through the conservation and sustainable utilisation of genetic resources in agriculture.
The Nordic countries benefit from one of the most comprehensive systems of regional partnership anywhere in the world. The Nordic Council of Ministers serves as the official body for intergovernmental cooperation and the Nordic Council as the official body for inter-parliamentary cooperation. The initial focus was on integration, but Nordic cooperation has become increasingly outward-looking in the age of globalisation, especially on genetic resources, a field in which NordGen (the Nordic Genetic Resource Centre) takes the practical lead in a well-established partnership.
NordGen manages the Global Seed Vault, located on the Svalbard archipelago in the Arctic. Popularly known as ‘Noah's Ark for seeds,' this unique facility is capable of storing up to 4.5 million samples. Its purpose is to safeguard the world's seeds and food supplies in the event of natural disasters, war or other threats.
The huge storage capacity makes it possible to store seeds from almost all the crops of the world. The three chambers extend deep into the bedrock, offering optimal conditions – the permafrost guarantees that the seeds will remain frozen even during a power cut. The vault is owned by Norway, but operated under a tripartite agreement among Norway, the international Global Crop Diversity Trust and NordGen.
Global interest has been massive, and seed samples from over 100 countries in Africa, Asia and South America have already been sent to Svalbard. It has also received samples from FAO's International Agricultural Research Centres, which house some of the largest and most important seed collections in the world. One key aim has been to involve developing countries where vulnerability to climate change impacts and extreme weather events, as well as political instability may threaten biological diversity.
In addition, the Nordic Region plays an active role in the development of gene banks in Africa and Asia.
So why is it so important to conserve our genetic resources and use them in a sustainable fashion?
Firstly, the Svalbard vault in particular and gene-bank partnerships in general are ways of restoring important species lost due to events such as natural disasters, which are expected to increase in frequency and intensity due to climate change. Modern agriculture uses advanced plant varieties based on the most productive genetics. The original land races and wild forms produce lower yields, but their greater genetic variation contains a higher diversity and could be used to produce more climate-resilient crops. High-yielding modern crops are therefore vulnerable when a new disease arises.
The consequences for genetic diversity will be dire if we fail to preserve such valuable genetic resources, especially in an era of climate change. It is vital that both ancient and new species are conserved in secure environments, and this applies to the cultivated parts of our biodiversity as a whole – forests and farm animals as well as crops.
However, seed banks are not just a back-up in the event of disaster. One of the aims of our work in Africa, for example, is to encourage researchers, plant breeders and farmers to use them on a regular basis in order to adapt to the impacts of climate change, such as increased water salinity or drought.
The countries of the world will gather in New York in May for the 17th session of the UN Commission on Sustainable Development. The agenda will include Africa, agriculture and desertification, and the Nordic countries will present their solutions for safeguarding global food supplies.
Superman built an Arctic fortress to protect his possessions. In the same way, we must protect and preserve our global genetic resources in order to promote global food security and help us on the road to a world free from the fear of famine.
|
__label__1
| 0.981448
|
Performance Schema Event Timing
Events are collected by means of instrumentation added to the server source code. Instruments time events, which is how the Performance Schema provides an idea of how long events take. It is also possible to configure instruments not to collect timing information. This section discusses the available timers and their characteristics, and how timing values are represented in events.
Two tables provide timer information:
Each timer row in setup_timers must refer to one of the timers listed in performance_timers.
Timers vary in precision and the amount of overhead they involve. To see what timers are available and their characteristics, check the performance_timers table:
mysql> SELECT * FROM performance_timers;
| CYCLE | 2389029850 | 1 | 72 |
| NANOSECOND | NULL | NULL | NULL |
| MICROSECOND | 1000000 | 1 | 585 |
| MILLISECOND | 1035 | 1 | 738 |
| TICK | 101 | 1 | 630 |
The TIMER_NAME column shows the names of the available timers. CYCLE refers to the timer that is based on the CPU (processor) cycle counter. If the values associated with a given timer name are NULL, that timer is not supported on your platform. The rows that do not have NULL indicate which timers you can use in setup_timers.
TIMER_FREQUENCY indicates the number of timer units per second. For a cycle timer, the frequency is generally related to the CPU speed. The value shown was obtained on a system with a 2.4GHz processor. The other timers are based on fixed fractions of seconds. For TICK, the frequency may vary by platform (for example, some use 100 ticks/second, others 1000 ticks/second).
TIMER_RESOLUTION indicates the number of timer units by which timer values increase at a time. If a timer has a resolution of 10, its value increases by 10 each time.
TIMER_OVERHEAD is the minimal number of cycles of overhead to obtain one timing with the given timer. The overhead per event is twice the value displayed because the timer is invoked at the beginning and end of the event.
To see which timer is in effect or to change the timer, access the setup_timers table:
mysql> SELECT * FROM setup_timers;
| wait | CYCLE |
-> WHERE NAME = 'wait';
mysql> SELECT * FROM setup_timers;
| wait | MICROSECOND |
By default, the Performance Schema uses the best timer available for each instrument type, but you can select a different one. Generally the best timer is CYCLE, which uses the CPU cycle counter whenever possible to provide high precision and low overhead.
The precision offered by the cycle counter depends on processor speed. If the processor runs at 1 GHz (one billion cycles/second) or higher, the cycle counter delivers sub-nanosecond precision. Using the cycle counter is much cheaper than getting the actual time of day. For example, the standard gettimeofday() function can take hundreds of cycles, which is an unacceptable overhead for data gathering that may occur thousands or millions of times per second.
Cycle counters also have disadvantages:
Currently, MySQL works with cycle counters on x386 (Windows, Mac OS X, Linux, Solaris, and other Unix flavors), PowerPC, and IA-64.
The setup_instruments table has an ENABLED column to indicate the instruments for which to collect events. The table also has a TIMED column to indicate which instruments are timed. If an instrument is not enabled, it produces no events. If an enabled instrument is not timed, events produced by the instrument have NULL for the TIMER_START, TIMER_END, and TIMER_WAIT timer values. This in turn causes those values to be ignored when calculating the sum, minimum, maximum, and average time values in summary tables.
Within events, times are stored in picoseconds (trillionths of a second) to normalize them to a standard unit, regardless of which timer is selected. The timer used for an event is the one in effect when event timing begins. This timer is used to convert start and end values to picoseconds for storage in the event.
Modifications to the setup_timers table affect monitoring immediately. Events already in progress may use the original timer for the begin time and the new timer for the end time, which may lead to unpredictable results. If you make timer changes, you may want to use TRUNCATE TABLE to reset Performance Schema statistics.
The timer baseline (time zero) occurs at Performance Schema initialization during server startup. TIMER_START and TIMER_END values in events represent picoseconds since the baseline. TIMER_WAIT values are durations in picoseconds.
Picosecond values in events are approximate. Their accuracy is subject to the usual forms of error associated with conversion from one unit to another. If the CYCLE timer is used and the processor rate varies, there might be drift. For these reasons, it is not reasonable to look at the TIMER_START value for an event as an accurate measure of time elapsed since server startup. On the other hand, it is reasonable to use TIMER_START or TIMER_WAIT values in ORDER BY clauses to order events by start time or duration.
The choice of picoseconds in events rather than a value such as microseconds has a performance basis. One implementation goal was to show results in a uniform time unit, regardless of the timer. In an ideal world this time unit would look like a wall-clock unit and be reasonably precise; in other words, microseconds. But to convert cycles or nanoseconds to microseconds, it would be necessary to perform a division for every instrumentation. Division is expensive on many platforms. Multiplication is not expensive, so that is what is used. Therefore, the time unit is an integer multiple of the highest possible TIMER_FREQUENCY value, using a multiplier large enough to ensure that there is no major precision loss. The result is that the time unit is picoseconds. This precision is spurious, but the decision enables overhead to be minimized.
|
__label__1
| 0.560602
|
Crunchyroll Streams Epic Fantasy Anime "Guin Saga"
Remarkably influential series comes to Crunchyroll
Kaoru Kurimoto's 130-volume epic fantasy novel series Guin Saga is a landmark in Japanese pop culture. Specifically, it was a key influence on works like Kentaro Miura's Berserk. More generally, in the early '80s, author Kaoru Kurimoto, along with Vampire Hunter D's Hideyuki Kikuchi, helped shape the template for light novels. A lot of the pacing and world building that helped define the medium come from those fantasy works.
Now, its 2009 anime adaptation is streaming on Crunchyroll. Atsushi Wakabayashi directs the Satelight (Macross F) work, with music by Final Fantasy's Nobuo Uematsu.
Currently episodes 1-4 of the 26-episode series can be viewed by all visitors. The rest are currently available to premium subscribers. Regional restrictions apply.
From Crunchyroll's description:
On the run from an army that destroyed their kingdom, the twin heirs to the Parros throne must avoid a magical land filled with incredible dangers. They are surrounded on all sides-by warring armies, an apelike tribe of desert creatures called the Sem, and the ruthless Langon clan. Giant sandworms, glowing, malevolent creatures, and powerful wizards mastering in the dark arts threaten them at every turn. If they were alone, they would surely perish. But in a dark forest, they are discovered by a mysterious stranger, a powerful warrior wearing a cursed leopard mask he cannot remove. His name is Guin. He becomes their protector and companion, though he remembers nothing of his life before meeting these young runaways. Together, they begin a treacherous quest to find safety for the royal twins-and the answers to Guin's secret origins. Based on the bestselling novels, this magical, animated epic is now available in one complete, sweeping set!
The first five volumes of the prose series and one of its manga spin-offs have been released in North America by Vertical Inc.
guin saga
Other Top News
Sort by:
|
__label__1
| 0.943667
|
Latest Virgo Cluster Stories
2010-08-19 12:25:00
Astronomers studying this black hole and its effects have been struck by the remarkable similarities between it and a volcano in Iceland that made headlines earlier this year.At a distance of about 50 million light years, M87 is relatively close to Earth and lies at the center of the Virgo cluster, which contains thousands of galaxies. M87's location, coupled with long observations over Chandra's lifetime, has made it an excellent subject for investigations of how a massive black hole impacts...
2009-05-20 09:45:00
Using ESO's Very Large Telescope, astronomers have succeeded in measuring the size of giant galaxy Messier 87 and were surprised to find that its outer parts have been stripped away by still unknown effects. The galaxy also appears to be on a collision course with another giant galaxy in this very dynamic cluster. The new observations reveal that Messier 87's halo of stars has been cut short, with a diameter of about a million light-years, significantly smaller than expected, despite being...
2008-10-07 11:49:00
2006-10-05 17:57:14
A gigantic sonic boom generated by a supermassive black hole has been found with NASA's Chandra X-ray Observatory, along with evidence for a cacophony of deep sound. This discovery was made by using data from the longest X-ray observation ever of M87, a nearby giant elliptical galaxy. M87 is centrally located in the Virgo cluster of galaxies and is known to harbor one of the Universe's most massive black holes. Scientists detected loops and rings in the hot, X-ray emitting gas that permeates...
2006-04-06 11:59:14
First results from the Arecibo Galaxy Environment Survey (AGES) suggest the discovery of a new dark galaxy. The AGES survey, which started in January 2006, is the most sensitive, large-scale survey of neutral hydrogen to date. Neutral hydrogen is found in most galaxies and it is a key tool in the search for dark galaxies as it can be detected even when there are no stars or other radiation sources to "shine a light" on matter. The new candidate dark galaxy is located near...
2005-09-21 14:39:56
CLEVELAND Â -- Case Western Reserve University astronomers have captured the deepest wide-field image ever of the nearby Virgo cluster of galaxies, directly revealing for the first time a vast, complex web of "intracluster starlight" -- nearly 1,000 times fainter than the dark night sky -- filling the space between the galaxies within the cluster. The streamers, plumes and cocoons that make up this extremely faint starlight are made of stars ripped out of galaxies as they...
2005-02-24 00:45:00
Latest Virgo Cluster Reference Libraries
2010-09-16 15:18:29
2010-09-13 16:56:08
2010-09-08 16:10:01
Markarian's Chain is a stretch of galaxies forming part of the Virgo Cluster. The galaxies get their name because when viewed from earth they form a curved line. The other part of the name comes from the Armenian astrophysicist, B. E. Markarian. Markarian discovered their common proper motion in the mid 1970s. Member galaxies include M84 (NGC 4374), M86 (NGC 4406), NGC 4477, NGC 4473, NGC 4461, NGC 4458, NGC 4438 and NGC 4435. It's located at RA 12h 27m and Dec +13° 10"². Photo...
2004-10-19 04:45:40
Virgo Cluster of Galaxies -- This giant agglomeration of galaxies is the nearest big cluster of galaxies, the largest proven structure in our intergalactic neighborhood, and the most remote cosmic objects with a physical connection to our own small group of galaxies, the Local Group, including our Milky Way galaxy. This structure is another discovery by Charles Messier, who noted behind his entry for M91 The Virgo Cluster is extremely rich in member galaxies, with over 2000 large and...
2004-10-19 04:45:40
Virgo A Galaxy -- Discovered 1781 by Charles Messier. The giant elliptical galaxy M87, also called Virgo A, is one of the most remarkable objects in the sky. It is perhaps the dominant galaxy in the closest big cluster to us, the famous Virgo Cluster of galaxies (sometimes also called "Coma-Virgo cluster" which is more acurate, as it extends into constellation Coma), and lies at the distance of this cluster (about 60 million light-years). M87 lies well in the heart of the Virgo cluster...
More Articles (5 articles) »
Word of the Day
|
__label__1
| 0.771973
|
productivityThorin Klosowski poses an interesting question over at Lifehacker: Are phones good productivity tools? Klosowski argues that, for almost every productivity task he needs to accomplish, there is a desktop or tablet app that will do it quicker and more efficiently than his phone.
“None of this is to say that I don’t appreciate a smartphone for what it is,” he hastily reassures us. “I still take pictures all the time, I listen to podcasts, dink around on Twitter, and look up oddball questions in the browser. But none of those things are actually productive.”
I suppose that for me, it all comes down to what you define as ‘productive.’ I don’t have enough appointments that I necessarily need an app to remind me of them, but that’s not about a phone or not a phone. I wouldn’t have a desktop app for that either. One thing I do spend a lot of time on, both for work and for personal enjoyment, is reading and a phone absolutely makes me more productive in that regard.
Sure, I may wait until I’m at the computer to save articles to Evernote or read Web-based content—itis more efficient on the desktop, and my phone’s data plan is not very robust. But cross-device e-book synccing has been the tech world’s gift to me in the last few years. The ability to sneak in a chapter while I’m on the bus, and then resume it at home on the book-sized screen of my choosing, is absolutely magical.
Sure, I see his point to a degree. I’m not going to whip out my iPhone and start word processing on it. But if I have a few minutes to kill, mid-commute, and I can choose between a book or a game of solitaire, it’s clear to me what the more ‘productive’ choice is.
|
__label__1
| 0.93903
|
For years, the Recording Industry Association of America (RIAA) has been harping on Google, saying the search giant makes it too easy for pirates to find and download music and media they haven't paid for. Despite continued pressure, there's some evidence that the RIAA continues to bark up the wrong tree — a new report from the nonprofit Computer and Communications Industry Association (CCIA) claims removing "undesirable" search results would not substantially alter or prevent piracy. "The solutions to online infringement have little to do with search," the report goes on to state. The study found that copyright-infringing sites receive little traffic from search, and evidence supports the notion that search terms like "mp3" or "torrent" are infrequently used — instead, pirates search for broader terms like an artist's name, something harder to weed potentially illegal results out of.
"The solutions to online infringement have little to do with search."
According to a few Internet data sources cited by the CCIA, only 15 percent of traffic to so-called "rogue sites" came from search, and data from Alexa showed that only about eight percent of traffic to The Pirate Bay comes from search. Operators from The Pirate Bay confirmed, this, saying that "a very low amount of our traffic actually comes from search engines like Google." Further data was collected from Google's own Trends tool. When comparing the number of people searching for a specific artist or song title compared with those searched for that same artist or song with "mp3" or "downloaded" included, the latter was so low it was practically insignificant.
It's worth noting that the CCIA's report only looked at a few popular songs, including Rihanna's "Diamonds" and Ke$ha's "Die Young" — there's a chance more rare or less popular music could show different results. While the CCIA only analyzed a few songs, it did point out that it looked at the same ones cited by the RIAA in a recent report claiming that Google wasn't doing enough to stop piracy. As for how the RIAA might be able to make better use of search to combat piracy, the CCIA suggests that the organization work with lawful online music vendors like Spotify to increase their prominence in search results — if more people are aware of legal options, they may be less likely to resort to piracy.
|
__label__1
| 0.563995
|
Oxidation of Alcohol
If you strip off hydrogens from the right carbon of ethanol in the presence of oxygen, you get acetic acid, the main component in vinegar. The molecular structure of acetic acid looks like this:
where C is carbon, H is hydrogen, O is oxygen, the hyphen is a single chemical bond between the atoms and the || symbol is a double bond between the atoms. For clarity, the bonds of the three hydrogen atoms to the left carbon atom are not shown. When ethanol is oxidized to acetic acid, two protons and two electrons are also produced.
Types of Devices: Alcosensor III or IV
Modern fuel-cell technology (which may power our cars and even our houses some day) has been applied to breath-alcohol detectors. Devices like the Alcosensor III and IV use fuel cells.
The fuel cell has two platinum electrodes with a porous acid-electrolyte material sandwiched between them. As the exhaled air from the suspect flows past one side of the fuel cell, the platinum oxidizes any alcohol in the air to produce acetic acid, protons and electrons.
Operators of any breath alcohol testing device must be trained in the use and calibration of the device, especially if the results are to be used as evidence in DWI trials. Law enforcement officers can carry portable breath testing devices that use the same principle as full-size devices. Court cases can turn on the perceived accuracy of a breath test, however, so prosecutors rely on the results obtained from full-size devices.
For more information on Breathalyzers and related topics, check out the links on the next page.
|
__label__1
| 0.999439
|
European Union
In fiscal 2013, U.S. exports of food and farm products to the European Union were valued at $11.5 billion, making it our fifth-largest agricultural export market. In June 2013, the United States and the EU launched an ambitious and comprehensive negotiation, the Transatlantic Trade and Investment Partnership (TTIP), to liberalize bilateral trade. A successful negotiation will yield significant opportunities for U.S. agriculture and promote international competitiveness, jobs and economic growth.
|
__label__1
| 0.971733
|
Beauty Products: How Much Do You Really Need?
sunscreen Back Next
Marko Metziner/Studio D
Amount estimate: The size of 1 tablespoon (for face); 1 shot glass (for body)
Sunblock is the one product you should never shy away from. “If you’re using only one bottle for the entre summer, you’re not using enough,” says Wexler. Apply a chemical sunscreen at least 30 minutes before stepping outdoors. With a physical block (one that contains zinc oxide and titanium dioxide), you can just slap on and go. Liberally smear sunscreen over any exposed areas and reapply every two hours.
|
__label__1
| 0.500414
|
Needed materials
Saw – skilsaw or crosscut saw
Tape Measure
2 inch long exterior wood screws
1 inch long exterior wood screws
1/8 drill bit for pilot holes
2 c-clamps
Hardware cloth
Framing square
Barrel bolt
The laying boxes of my chicken coop are made out of 1x12s. After building the coop I had a piece of 1×12 that was 44 inches long. The left over piece for the laying boxes was cut in half, that was there was no waste.
Cut the hole in the side of the coop about 1/8 higher then what the doors measure and about 3/8 wider then what the doors measure.
How wide is the window? Add 7 inches to the width and cut a 1×4 to length. Lets say the window is 11 inches wide (2 1x6s), cut a single 1×4 18 inches long.
Insert the 1×4 into the coop, align the bottom of the 1×4 with the top edge of the the hole for the window, clamp in place. This is called a backer. 3/8 plywood is too weak to hold a screw. so you add a backer for the screws to run into.
Run a couple of 1 inch long screws through the 3/8 plywood and into the 1×4 backer.
Do the same thing for the side backers.
Time to cut the hardware cloth
Whatever size you cut the hole for the window, add 5 inches and cut your hardware cloth. The 5 inches is for 2 1/2 inches of overlap on each side of the window.
From the edge of the window, measure over 2 1/2 inches for the overlap. Hold the hardware cloth in place, secure with a few 3/4 galvanized staples.
The second half of this video talks about how to make a window for a chicken coop
Its time to install the outside window frame
Cut 1 1×4 the width of the window.
Cut 2 1x4s the height of the window plus 3 1/2 inches.
I like to start on the right hand side of the window. Install the outside frame, secure with some 2 inch long exterior screws.
To start with, install only a couple of screws, as the screws for the hinges will add extra strength.
Install the hinges on the boards that will cover the window. I tried to space the hinges equally on the door. If the door is 21 inches long, the hinges were spaced 7 inches apart.
Install the doors on the window.
When the windows were installed on the frame, I used 2 inch long screws on the frame side, and the screws that came with the hinges on the window covers. 2 inch long screws are long enough to go through the hinge – 1×4 frame – hardware cloth – 3/8 plywood – 1×4 backer. This ensures that all the pieces of the window are sandwiched together.
With the 2 inch long screws going through the hardware cloth, this ensures that nothing can push the hardware cloth loose and get inside the coop.
Install the barrel bolt in the middle of the windows to keep them closed during bad or cold weather. I usually close the doors of the chicken coop when harsh weather is on the way.
Post your comments and questions about a window for your chicken coop in this forum thread – How to build a window for a chicken coop.
Chickens for term SHTF / TEOTWAWKI survival
Raising chickens for shtf / teotwawki
Barred Rock on perch inside chicken coop
If there is one farm animal that is capable of taking care of itself, it has to either be the pig of the chicken. Since this article is talking about chickens, lets talk about chickens.
Todays domesticated chicken is a descendant of the jungle fowl and grey jungle fowl.. Its estimated that the chickens were first domesticated in china at around 6,000 BC. That means humans have been raising chicken for close to 8,000 years.
Think about that for a few minutes. Humans have been keeping chickens before written language, before the rise and fall of the Egyptian and Roman empires, and before life as we know it ever existed.
Chickens, like pigs, are omnivores, meaning they eat just about anything.
One of the reasons why humans first domesticated chickens is because the jungle fowl came close to human encampments to eat the scraps. People soon realized that its easier to catch the jungle fowl and keep it in cages then to hunt it.
From a SHTF / teotwawki survival situation, is it better to have your food close at hand, or have to go hunt your food. That is where chickens come into play.
While animals like goats and cows produce milk, chickens produce eggs. Eggs are a whole lot easier to collect then to milk a cow or goat.
Eggs store better then milk.
Milk needs to be pasteurized to be safe to drink, eggs need to be cooked. Cooking eggs is a lot easier to do then pasteurization of milk.
Eggs are easier to handle and transport then milk.
Eggs contain more protein then milk.
Eggs contain a wider range of trace nutrients then milk.
While cattle and goats need certain things in their diet, chickens eat just about anything.
In my opinion, goats are a close second to chickens. But if you want a well rounded farm animal, its going to be difficult to beat chickens.
The following two tabs change content below.
Kevin Felts
|
__label__1
| 0.622399
|
Winckworth Sherwood
UK 200 2013 position: 94
Admissibility of covert recordings
G was employed by the bank until her resignation in January 2013. In April 2013, she lodged a claim at the employment tribunal, alleging sexual harassment, sex discrimination and constructive unfair dismissal.
Prior to her resignation, she attended a grievance hearing in November 2012 and a disciplinary hearing in January 2013. She recorded both ‘public’ and ‘private’ conversations connected with those hearings. The recordings were disclosed to the bank in July 2013. The bank objected to the use of the private contents of those recordings (but not to the use of the recordings of the public discussions at the hearings) as evidence in the employment tribunal. The private elements were discussions between members of the panel hearing the grievance, when G was out of the room, primarily during a break in the grievance hearing when the recording ran to 15 minutes. The private discussion to which the bank objected at the disciplinary stage was only some 30 seconds…
Minerva House
5 Montague Close
Turnover (£m): 25.70
Total Lawyers: 125
|
__label__1
| 0.989778
|
How did farming improve?
During the years 1700 to 1770, farming improved by introduction of the four year rotation method for crops, and the weather changed for the better for improved harvests. Thanks!
More Info:
Soil science
Organic farming
Organic farming is a form of agriculture that relies on techniques such as crop rotation, green manure, compost and biological pest control. Organic farming uses fertilizers and pesticides (which include herbicides, insecticides and fungicides) but excludes or strictly limits the use of manufactured (synthetic) fertilizers, pesticides , plant growth regulators such as hormones, livestock antibiotics, food additives, genetically modified organisms, human sewage sludge, and nanomaterials.
Agriculture in the United Kingdom
Agriculture in the United Kingdom uses around 70% of the country's land area and contributes about 0.7% of its gross value added. The UK produces less than 60% of the food it eats. Despite skilled farmers, high technology, fertile soil and subsidies, which primarily come from the European Union (EU), farm earnings are relatively low, mainly due to low prices at the farm gate. With each generation, fewer young people can afford the rising capital cost of entry into farming and more are discouraged by low earnings. The average age of the British farm holder is now 59.
Recently there have been moves towards organic farming in an attempt to sustain profits, and many farmers supplement their income by diversifying activities away from pure agriculture. Biofuels present new opportunities for farmers against a background of rising fears about fossil fuel prices, energy security, energy sustainability, and climate change. There is increasing awareness that farmers have an important role to play as custodians of the British countryside and wildlife.
Tropical agriculture
Sustainable agriculture
Sustainable agriculture is the act of farming using principles of ecology, the study of relationships between organisms and their environment. The phrase was reportedly coined by Australian agricultural scientist Gordon McClymont. It has been defined as "an integrated system of plant and animal production practices having a site-specific application that will last over the long term" For Example:
Agronomy Weather Environment
Related Websites:
Terms of service | About
|
__label__1
| 0.735049
|
Abby and Whitney
Abby WhitneyWhitney comes to the realization that she has to grow up and work harder so she can go to TCC and become a nurse. Abby was raised by her father who is supportive but she had to develop the confidence in herself to succeed.
Listen to Abby and Whitney's story.
|
__label__1
| 0.998384
|
View Single Post
Old 08-15-2008, 10:15 PM #118
Dojo: Shobu Aikido of Connecticut
Location: East Haven, CT
Join Date: Jul 2004
Posts: 1,402
Re: "Aiki" in Russian Video Clips
Does he receive merely, or does he express a countering touch or adjustment?
Dan can do either/both.
His ability to stay so super balanced while moving and attacking is the #2 reason I have been so impressed with him. His students' abilities are the #1 reason.
My making it simple was to get a sense of if you can do it as well at the simplest level, and if your students could. I'm assuming (no offense - everyone is assuming the same) that you cannot do the same - unless you state otherwise.
Sorry about my boundry issue, feel free to start a new thread in any thread devoid of "non-aikido" in the title and I'll discuss it as far as I can (admittedly, I'm not sure how far that is, but I'd be willing to try).
As far as someone else doing it - I think that is a terrible idea.
I think the only reasonable idea to do it and have it be worth reading is to actually meet with Dan or one of the other guys and THEN model to your hearts content. Then, show that model to students and tell us about their improvement. IF they do improve to anywhere near the ability of the people using "jargon" everyone will become completely interested. Until then, I think you are asking to describe a truth - no one believes you have any true insight into - and seem to be wondering why no one knows how to help collaborate with you.
I know you want "truth" - I think we (those using jargon) just want what is "best" and your attempt at "truth" doesn't seem to be what's best which makes it difficult for us to consider it "truth".
|
__label__1
| 0.984512
|
What is W x H equals F x L?
W x H equals F x L is an unsolvable equation, because there are only variables and no constants. Enjoy!
More Info:
Mathematical analysis
Mathematical analysis is a branch of mathematics that includes the theories of differentiation, integration, measure, limits, infinite series, and analytic functions. These theories are usually studied in the context of real and complex numbers and functions. Analysis evolved from calculus, which involves the elementary concepts and techniques of analysis. Analysis may be distinguished from geometry. However, it can be applied to any space of mathematical objects that has a definition of nearness (a topological space) or specific distances between objects (a metric space).
Elementary algebra
Elementary algebra encompasses some of the basic concepts of algebra, one of the main branches of mathematics. It is typically taught to secondary school students and builds on their understanding of arithmetic. Whereas arithmetic deals with specified numbers, algebra introduces quantities without fixed values, known as variables. This use of variables entails a use of algebraic notation and an understanding of the general rules of the operators introduced in arithmetic. Unlike abstract algebra, elementary algebra is not concerned with algebraic structures outside the realm of real and complex numbers.
The use of variables to denote quantities allows general relationships between quantities to be formally and concisely expressed, and thus enables solving a broader scope of problems. Most quantitative results in science and mathematics are expressed as algebraic equations.
Ordinary differential equations
Applied mathematics
Social sciences
In logic, syntax is anything having to do with formal languages or formal systems without regard to any interpretation or meaning given to them. Syntax is concerned with the rules used for constructing, or transforming the symbols and words of a language, as contrasted with the semantics of a language which is concerned with its meaning.
The symbols, formulas, systems, theorems, proofs, and interpretations expressed in formal languages are syntactic entities whose properties may be studied without regard to any meaning they may be given, and, in fact, need not be given any.
Variables Equation
Partial differential equation
Applied mathematics
Social sciences
Equation solving
In mathematics, to solve an equation is to find what values (numbers, functions, sets, etc.) fulfill a condition stated in the form of an equation (two expressions related by equality). These expressions contain one or more unknowns, which are free variables for which values are sought that cause the condition to be fulfilled. To be precise, what is sought are often not necessarily actual values, but, more in general, mathematical expressions. A solution of the equation is an assignment of expressions to the unknowns that satisfies the equation; in other words, expressions such that, when they are substituted for the unknowns, the equation becomes an identity.
For example, the equation x + y = 2x – 1 is solved for the unknown x by the solution x = y + 1, since substituting y + 1 for x in the equation results in (y + 1) + y = 2(y + 1) – 1, a true statement. It is also possible to take the variable y to be the unknown, and then the equation is solved by y = x – 1. Or x and y can both be treated as unknowns, and then there are many solutions to the equation, some of which are (x, y) = (1, 0) – that is, x = 1 and y = 0 – and (x, y) = (2, 1), and, in general, (x, y) = (a + 1, a) for all possible values of a.
Education Politics
Related Websites:
Terms of service | About
|
__label__1
| 0.99856
|
Assessments of the Energy, Mass and Size of the Chicxulub Impactor
In 1980 there was no known impact structure, which could be responsible for this extinction. It was not until 1991 that an international group of researchers proposed that a circular structure between 180 and 200 km, buried under Tertiary deposits in the Yucatan Peninsula in Mexico, was the crater formed by the impact proposed by the group of Alvarez (Hildebrand et al., 1991). It is very probable that an impact of this magnitude have had large effects on the surface and in the environment. To study these effects, it is necessary to estimate the characteristics that the impactor had.
The literature often mentions the nature of the impactor, and has been proposed both an asteroid and a comet, and even a comet shower that produced periodic extinctions. However, the physical parameters of the impactor are not limited, so the aim of this study is to estimate the most relevant features of this one such as the size, mass and kinetic energy. We found that the kinetic energy of the impactor is in the range from 1.3e24 J to 5.8e25 J. The mass is in the range of 1.0e15 kg to 4.6e17 kg.
Finally, the diameter of the object is in the range of 10.6 km to 80.9 km. Based on the mass of the impactor and iridium abundance in different types of meteorites, we calculate the concentration of iridium, which should be observed in the K/Pg layer. When compared with the measurements, we concluded that the best estimation is that the impactor was a comet.
Hector Javier Durand-Manterola, Guadalupe Cordero-Tercero (Submitted on 19 Mar 2014)
Comments: 11 pages, 3 figures, 2 Tables
Subjects: Earth and Planetary Astrophysics (astro-ph.EP)
Cite as: arXiv:1403.6391 [astro-ph.EP] (or arXiv:1403.6391v1 [astro-ph.EP] for this version)
Submission history From: Hector Javier Durand-Manterola [v1] Wed, 19 Mar 2014 19:08:09 GMT (6379kb)
Please follow Astrobiology on Twitter.
• submit to reddit
|
__label__1
| 0.772755
|
The purpose of the paper is to describe a cooperative system which was designed to provide intelligent assistance in the domain of diagnostic radiology. The approach taken includes the collection and analysis of human performance data, cognitive modelling of the interaction between perception and problem solving. incorporation of this knowledge into a blackboard-based architecture. implementation of a prototype system and testing and evaluation of the prototype. These stages are described, and then discussed in the context of issues particularly relevant to the study of human-machine cooperation.
Computer Sciences
URL: http://digitalcommons.calpoly.edu/csse_fac/171
|
__label__1
| 0.995658
|
Frequently Asked Questions
How much does it cost to rent a moonbounce?
Our rentals start as low as $175 plus sales tax for the first hour and $10 plus sales tax for each additional hour.
Do I have to have the moonbounce delivered or can I pick it up myself?
Unfortunately, you cannot pick the moonbounce up yourself. Due to safety concerns, we are required to set up and take down every rental. This ensures your safety, as the units can be very heavy, as well as allows us an opportunity to review the rules and regulations regarding the operation of the unit. SAFETY FIRST!
Are your units clean?
Yes, our units are vacuumed and sanitized prior to each use.
How large are your moonbounces?
Most of our units are 15' x 15' plus a 2' step. This makes them approx 15' x 17' overall.
How much room do I need to set up?
Most of our units require a 20' x 20' area that is semi-level, clear of any rocks, sticks, roots, etc that could puncture the bounce. Also, if you have an in-ground sprinkler system, make sure it is turned off and the sprinkler heads are not engaged.
We live in an apartment/townhouse and don't have a yard large enough, how can we still have a party for our child?
It's true, many apartments/townhouses don't provide a lot of room for a bounce. However, there are alternatives. Some potential ideas:
• Use the common area or two parking spaces side by side.
• Use a relative's house for the party.
• For communions and other church related events, look into using your church grounds.
• If for a birthday, combine parties with your child's friend that has a birthday close to your child's.
• Local parks can usually be used for parties. There is generally a small hourly fee associated with this. We have generators for rent and will be more than happy to help you work out the details with the city or county park authority.
How many kids can safely bounce at once?
This depends on the size of the inflatable, however we provide the following maximum capacity numbers:
Unit Size
Children 8 and under
Children 8 - 12
15' x 15'
How does the bounce stay inflated?
The bounce is inflated with a fully enclosed blower motor unit that must stay on the entire time the bounce unit is being used. The design of the blower is such that no moving parts are exposed. This is a very important safety feature that you should take into account whenever considering a rental. The blower unit must be located within ~75 feet of an electrical outlet.
Can we set up the bounce on concrete or asphalt?
Yes, however for safety reasons, we prefer that the bounce be placed on a level, grassy area.
How do you keep the bounce from floating away?
While they are full of air, the bounces themselves are quite heavy. However, they do need to be staked down to avoid them "walking" around. To accomplish this we use large sandbags at each corner when setting up on concrete or asphalt. When setting up grassy areas, we use large stakes that are driven into the ground. While these stakes do not go deep enough to hit utility lines, please let us know if we will be setting up near items such as drainage lines or sprinkler lines.
The location that we wish to use is not close to electrical power, I guess we can't have a bounce?
Don't let that stop you. We have generators available for rent, including a full tank of fuel, that will power the blowers that inflate the bounce.
Can I cancel my reservation?
We realize that plans can change and we will gladly refund 100% of your deposit when provided with at least 7 days notice prior to your reservation date. If provided less than 7 days notice, we will not refund deposits. Weather related cancellations are only determined on the day of the rental and will result in a complete refund of any deposit.
If the local forecast is calling for high winds (> 20 MPH), or rain on the morning of your reservation, we will contact you via phone to reschedule your reservation for another day or to provide a refund of your deposit. Rescheduling is based on availability for the day requested. If you feel that rain or wind is a concern, please bring this to our attention PRIOR to us arriving at your location. No Refunds will be provided once the bounce is set up. Hop On Pop's MoonBounce reserves the right to cancel a rental and provide a full refund of your deposit if it is raining or rain is inevitable.
What do we do if there is an emergency?
In the case of an emergency, have everyone exit the bounce calmly and quickly and contact Hop On Pop's MoonBounce at 703.986.3515 ext. 2.
Does Hop On Pop's MoonBounce have insurance?
Definitely! Due to the high cost of insurance, there are many companies out there that choose to not carry insurance coverage. However, at Hop On Pop's MoonBounce, we believe that this is the most important requirement for running a moonbounce rental business. As such, we are fully insured with a liability insurance policy covering injury due to Hop On Pop's MoonBounce's gross negligence. This statement in no way implies legal responsibility. Please read your rental agreement. We are happy to provide a copy of our insurance binder upon request.
What are my responsibilities as the renter of the bounce?
Our contract requires that an adult be home when the bounce is setup. We will review the features of the bounce with this individual, as well as our safety regulations. Additionally, we will review our emergency procedures with this individual at the time of setup. An adult MUST accompany the bounce anytime the bounce is inflated. This person is responsible for the safety of the children, as well as, the care of the equipment by making sure that ALL safety rules and regulations are followed. Aside from safety items, it is the responsibility of the renter to provide for electrical power within 75 feet of the bounce and a level, open 20' x 20' area to set up on.
Can you provide an attendant with our rental?
Absolutely! We will happily provide an attendant for your rental to free you from having to worry about who is watching the bounce. This must be requested at least 10 days prior to your reservation day and there is an attendant charge of $35/hour.
How safe are moonbounces?
As long as the safety rules are followed, bounces are very safe. In fact, most accidents that arise from the use of moonbounces are a direct result of the renters not following the posted safety rules by allowing the unit to be overloaded, allowing the unit to be used in high winds, etc.
How do I reserve a unit?
Call or email us at 703.986.3515 or and we will be happy to process your reservation request. We will then tentatively reserve your unit, fax or email you a rental agreement and Safety Rules and Regulations agreement for you to sign and return. Once we have received your signed documents and your deposit, we will finalize your reservation.
How much of a deposit is required to confirm a reservation?
While you may pay up to 100% of the rental fees up front if you like, we require that you provide a deposit equal to 30% of the total charges or provide a credit card in order for us to confirm the equipment for you.
How can I pay for the unit?
Our preference is a check, but we also accept cash, Visa, and Master Card. Payment is due in full at the time of setup. The delivery person will provide you with a copy of the rules, review the safety procedures with you and collect final payment prior to setting up the unit.
What is your delivery area?
Our primary delivery areas are the Greater Washington DC area: Northern Virginia, Washington DC and parts of Maryland, Charlottesville, VA, Richmond, VA and Raleigh, NC.
Do you provide special pricing to schools, churches and other non-profit organizations?
Absolutely! Please email or call us at 703.986.3515 for details. We would love to work with you. Please note that a moonbounce can make a great compliment to a non-profit fundraiser, such as a carwash or other event. While the parents are getting the car washed, it provides some fun for the kids and also provides instant "curb appeal" for your function.
|
__label__1
| 0.666047
|
skip navigation
CRS Annotated Constitution
Fourteenth Amendment -- Table of ContentsPrev | Next
Guilty Pleas.—A defendant may plead guilty instead of insisting that the prosecution prove him guilty. There are a number of different reasons why a defendant may be willing to plead guilty, perhaps because of overwhelming evidence against him, perhaps because, while the evidence leaves the outcome in doubt, should he go to trial and be convicted his sentence will be more severe than if he pleads guilty, perhaps to secure some other advantage. Often the defendant and his attorney engage in “plea bargaining” with the prosecution so that he is guaranteed a light sentence or is allowed to plead to a lesser offense. While the government may not structure its system so as to coerce a guilty plea,63 a guilty plea that is entered voluntarily, knowingly, and understandingly, even to obtain an advantage, is sufficient to overcome constitutional objections.64 The guilty plea and the often concomitant plea bargain are important and necessary components of the criminal justice system,65 and it is not impermissible for a prosecutor during such plea bargains to put a defendant to a hard choice, requiring him to forego his right to go to trial in return for escaping what is likely to be a much more severe penalty if he does elect to go to trial.66
The court must inquire whether the defendant is pleading voluntarily, knowingly, and understandingly,67 and “the adjudicative element inherent in accepting a plea of guilty must be attended by safeguards to insure the defendant what is reasonably due in the circumstances. Those circumstances will vary, but a constant factor is that when a plea rests in any significant degree on a promise or agreement of the prosecutor, so that it can be said to be part of the inducement or consideration, such promise must be fulfilled.”68
Prosecutorial Misconduct.—When a conviction is obtained by the presentation of testimony known to the prosecuting authorities to have been perjured, due process is violated. The clause “cannot be deemed to be satisfied by mere notice and hearing if a State has contrived a conviction through the pretense of a trial which in truth is but used as a means of depriving a defendant of liberty through a deliberate deception of court and jury by the presentation of testimony known to be perjured. Such a contrivance . . . is as inconsistent with the rudimentary demands of justice as is the obtaining of a like result by intimidation.”69 The quoted language was dictum in the case in which it was uttered,70 but the principle enunciated has been utilized to require state officials to controvert allegations of convicted persons that knowingly false tes[p.1759]timony had been used to convict,71 and to upset convictions found to have been so procured.72 Extending the principle, the Court in Miller v. Pate73 upset a conviction obtained after the prosecution had represented to the jury that a pair of men’s shorts found near the scene of a sex attack belonged to the defendant and that they were stained with blood; the defendant showed in a habeas corpus proceeding that no evidence connected him with the shorts and furthermore that the shorts were not in fact bloodstained, and that the prosecution had known these facts.
Furthermore, in Brady v. Maryland,74 the Court held “that the suppression by the prosecution of evidence favorable to an accused upon request violates due process where the evidence is material either to guilt or to punishment, irrespective of the good faith or bad faith of the prosecution.” In that case, the prosecution had suppressed an extrajudicial confession of defendant’s accomplice that he had actually committed the murder; the accomplice’s confession could have influenced the jury’s determination of punishment but not its judgment of guilt. But this beginning toward the development of criminal discovery was not carried forward,75 and the Court has waivered in its application of Brady.
In finding Brady inapplicable because the evidence withheld was not material and not exculpatory, the Court in Moore v. Illinois,76 restated the governing principles. “The heart of the holding in Brady is the prosecution’s suppression of evidence, in the face of a defense production request, where the evidence is favorable to the accused and is material either to guilt or to punishment. Important, then, are (a) suppression by the prosecution after a request by the defense, (b) the evidence’s favorable character for the defense, and (c) the materiality of the evidence.”
In United States v. Agurs,77 the Court summarized and somewhat expanded the prosecutor’s obligation to disclose to the defense exculpatory evidence in his possession, even in the absence of a request, or upon a general request, by defendant. The obligation is expressed in a tripartite test of materiality of the exculpatory evidence in the context of the trial record. First, if the prosecutor knew or should have known that testimony given to the trial was perjured, the conviction must be set aside if there is any reasonable likelihood that the false testimony could have affected the judgment of the jury.78 Second, if the defense specifically requested certain evidence and the prosecutor withheld it, the conviction must be set aside if the suppressed evidence might have affected the outcome of the trial.79 Third (the new law created in Agurs), if the defense did not make a request at all, or simply asked for “all Brady material” or for “anything exculpatory,” a duty resides in the prosecution to reveal to the defense obviously exculpatory evidence; if the prosecutor does not reveal it, reversal of a conviction may be required, but only if the undisclosed evidence creates a reasonable doubt as to the defendant’s guilt.80
Supplement: [P. 1760, add to text after n.80:]
This tripartite formulation, however, suffered from two apparent defects. First, it added a new level of complexity to a Brady inquiry by requiring a reviewing court to establish the appropriate level of materiality by classifying the situation under which the exculpating information was withheld. Secondly, it was not clear, if the fairness of the trial was at issue, why the circumstances of the failure to disclose should affect the evaluation of the impact that such information would have had on the trial. Ultimately, the Court addressed these issue in the case of United States v. Bagley.24
In Bagley, the Court established a uniform test for materiality, choosing the most stringent requirement that evidence is material if there is a reasonable probability that, had the evidence been disclosed to the defense, the outcome of the proceeding would have been different.25 This materiality standard, found in contexts outside of Brady inquiries,26 is applied not only to exculpatory material, but also to material which would be relevant to the impeachment of witnesses.27 Thus, where inconsistent earlier statements by a witness to an abduction were not disclosed, the Court weighed the specific effect that impeachment of the witness would have had on establishing the required elements of the crime and of the punishment, finally concluding that there was no reasonable probability that the jury would have reached a different result.28
A prosecutor does not violate the due process clause when, in negotiating with a defendant to obtain a guilty plea or some other action that will lessen the trial burden, such as trial before a judge[p.1761]rather than jury, he threatens and carries out the threat to seek a more severe sentence, either by charging a greater offense or recommending a longer sentence.81 But the prosecutor does deny due process if he penalizes the assertion of a right or privilege by the defendant by charging more severely or recommending a longer sentence.82 The distinction appears to represent very fine line–drawing, but it appears to be one the Court is committed to.
63 United States v. Jackson, 390 U.S. 570 (1968) .
64 North Carolina v. Alford, 400 U.S. 25 (1971) ; Parker v. North Carolina, 397 U.S. 790 (1970) . See also Brady v. United States, 397 U.S. 742 (1970) . A guilty plea will ordinarily waive challenges to alleged unconstitutional police practices occurring prior to the plea, unless the defendant can show that the plea resulted from incompetent counsel. Tollett v. Henderson, 411 U.S. 258 (1973) ; Davis v. United States, 411 U.S. 233 (1973) . But see Blackledge v. Perry, 417 U.S. 21 (1974) . The State can permit pleas of guilty in which the defendant reserves the right to raise constitutional questions on appeal, and federal habeas courts will honor that arrangement. Lefkowitz v. Newsome, 420 U.S. 283 (1975) . Release–dismissal agreements, pursuant to which the prosecution agrees to dismiss criminal charges in exchange for the defendant’s agreement to release his right to file a civil action for alleged police or prosecutorial misconduct, are not per se invalid. Town of Newton v. Rumery, 480 U.S. 386 (1987) .
65 Blackledge v. Allison, 431 U.S. 63, 71 (1977) .
66 Bordenkircher v. Hayes, 434 U.S. 357 (1978) . Charged with forgery, Hayes was informed during plea negotiations that if he would plead guilty the prosecutor would recommend a five–year sentence; if he did not plead guilty, the prosecutor would also seek an indictment under the habitual criminal statute under which Hayes, because of two prior felony convictions, would receive a mandatory life sentence if convicted. Hayes refused to plead, was reindicted, and upon conviction was sentenced to life. Four Justices dissented, id. at 365, 368, contending that the Court had watered down North Carolina v. Pearce, 395 U.S. 711 (1969) . See also United States v. Goodwin, 457 U.S. 368 (1982) .
67 Boykin v. Alabama, 395 U.S. 238 (1969) . In Henderson v. Morgan, 426 U.S. 637 (1976) , the Court held that a defendant charged with first degree murder who elected to plead guilty to second degree murder had not voluntarily, in the constitutional sense, entered the plea because neither his counsel nor the trial judge had informed him that an intent to cause the death of the victim was an essential element of guilt in the second degree; consequently no showing was made that he knowingly was admitting such intent. “A plea may be involuntary either because the accused does not understand the nature of the constitutional protections that he is waiving . . . or because he has such an incomplete understanding of the charge that his plea cannot stand as an intelligent admission of guilt.” Id. at 645 n.13. See also Blackledge v. Allison, 431 U.S. 63 (1977) .
68 Santobello v. New York, 404 U.S. 257, 262 (1971) . Defendant and a prosecutor reached agreement on a guilty plea in return for no sentence recommendation by the prosecution. At the sentencing hearing months later, a different prosecutor recommended the maximum sentence, and that sentence was imposed. The Court vacated the judgment, holding that the prosecutor’s entire staff was bound by the promise. Prior to the plea, however, the prosecutor may withdraw his first offer, and a defendant who later pled guilty after accepting a second, less attractive offer has no right to enforcement of the first agreement. Mabry v. Johnson, 467 U.S. 504 (1984) .
69 Mooney v. Holahan, 294 U.S. 103, 112 (1935) .
73 386 U.S. 1 (1967) .
76 408 U.S. 786, 794–95 (1972) . Joining Justice Blackmun’s opinion were Justices Brennan, White, Rehnquist, and Chief Justice Burger. Dissenting were Justices Douglas, Stewart, Marshall, and Powell. Id. at 800.
Supplement: [P. 1760, add to n.76:]
See also Wood v. Bartholomew, 516 U.S. 1 (1995) (per curiam) (holding no Due Process violation where prosecutor’s failure to disclose the result of a witness’ polygraph test would not have affected the outcome of the case).
77 427 U.S. 97 (1976) .
78 Id. at 103–04. This situation is the Mooney v. Holohan type of case.
79 Id. at 104–06. This the Brady situation.
80 Id. at 106–14. This was the Agurs fact situation. Similarly, there is no obligation that law enforcement officials preserve breath samples which have been utilized in a breath–analysis test; the Agurs materiality standard is met only by evidence which “possess[es] an exculpatory value . . . apparent before [it] was destroyed, and also [is] of such a nature that the defendant would be unable to obtain comparable evidence by other reasonably available means.” California v. Trombetta, 467 U.S. 479, 489 (1984) . See also Arizona v. Youngblood, 488 U.S. 51 (1988) (negligent failure to refrigerate and otherwise preserve potentially exculpatory physical evidence from sexual assault kit does not violate a defendant’s due process rights absent bad faith on the part of the police).
81 Bordenkircher v. Hayes, 434 U.S. 357 (1978) ; United States v. Goodwin, 457 U.S. 368 (1982) . In the former case, during plea negotiations, the prosecutor told defendant that if he did not plead guilty to the charges he would bring additional charges, and he did so upon defendant’s continued refusal. In the latter case, defendant was charged with a misdemeanor and could have been tried before a magistrate; he refused to plead guilty and sought a jury trial in district court. The Government obtained a four–count felony indictment based upon the same conduct and acquired a conviction.
82 Blackledge v. Perry, 417 U.S. 21 (1974) . Defendant was convicted in an inferior court of a misdemeanor. He had a right to a de novo trial in superior court, but when he exercised the right the prosecutor obtained a felony indictment based upon the same conduct. The distinction the Court draws between this case and Bordenkircher and Goodwin is that of pretrial conduct, in which vindictiveness is not likely, and posttrial conduct, in which vindictiveness is more likely and is not permitted. Accord, Thigpen v. Roberts, 468 U.S. 27 (1984) .
Supplement Footnotes
24 473 U.S. 667 (1985) .
25 473U.S. at 682 473U.S. at 682.
26 See United States v. Malenzuela–Bernal, 458 U.S. 858 (1982) (testimony made unavailable by Government deportation of witnesses); Strickland v. Washington, 466 U.S. 668 (1984) (incompetence of counsel).
27 473U.S. at 676–77 473U.S. at 676–77.
28 Strickler v. Greene, 527 U.S. 263 (1999) .
Fourteenth Amendment -- Table of ContentsPrev | Next
|
__label__1
| 0.615329
|
[violence] general
Violence against women and girls is a human rights and public health emergency worldwide. We call on you to join us to take action to end violence against women and hold our governments accountable for women’s access to health!
Violences conjugales, "crimes d'honneur", situation des femmes et des filles au sein de la famille et dans la sphère "privée", etc...
The International Crisis Group strongly condemns the brutal police attack on Asma Jahangir and other rights activists participating in a peaceful gathering in Lahore, Pakistan, on 14 May 2005.
Rappel de l'affaire de l'imam de Vénissieux avec le journal Lyon Mag qui avait publié un article rapportant les propos de l'imam sur la lapidation et le fait de battre sa femme ....
This report is part of a project to analyse and research discrimination and violence against women in the GCC countries. In July and August 2004, Amnesty International (AI) delegates carried out research in Bahrain, Kuwait, Oman, Qatar, and the UAE.
This toolkit aims to offer guidance to those seeking to establish legal justice for survivors of Gender Based Violence (GBV), as well as for those in settings where legal justice is not yet a possibility.
Dans cet Appel à l’action, le RMFDR insiste sur la responsabilité du secteur de la santé publique à fournir une prévention et des soins fondés sur l’approche des soins de santé primaires et qui soient centrés sur les femmes.
لَقِّم المحتوى
|
__label__1
| 0.62875
|
Posts Tagged ‘historical fiction’
One Crazy Summer by Rita Williams-Garcia
imageOver the last couple of years, I have had quite a few books connected with the Civil Rights movement come across my TBR pile. Most of them have been excellent, and I have learned something from all of them, whether I was reading historical fiction or historical accounts. Rita Williams Garcia introduced me to yet another aspect of those years that I knew next-to-nothing about in her novel One Crazy Summer (Scholastic 2010).
Delphine leads her younger sisters, Vonetta and Fern, to visit the mother who left them. They fly across the country to Oakland, California, for the summer of 1968, to get to know the mysterious Cecile. Even once they are living in her house, Cecile remains a mystery, but Delphine is not stubborn and bossy for nothing. She will do whatever it takes to protect her sisters and get answers from Cecile. She might even learn something about herself along the way.
Delphine’s first surprise (after Cecile kicks them out of the house for the day) is her encounter with the Black Panthers. Behind the headlines she heard back in New York City, she discovers that the Black Panthers distribute food to hungry children in the neighborhood and run a day camp for kids at the Community Center. Before she quite knows how it happens, Delphine, Vonetta, and Fern are practicing parts to perform in a demonstration at the community park. Before the demonstration is over, will encounter even more surprises.
Williams-Garcia tackles some serious issues in this novel–racism, abandonment, and families–and she does it with wit and humor. Delphine is an unforgettable character, who is much stronger than she realizes. As she finds her voice, she discovers the power of poetry and the power of the people and the power of herself.
Tiger, Tiger by Lynne Reid Banks
imageLynne Reid Banks brings the streets and palaces and circuses of Ancient Rome to life with an unforgettable cast of characters in Tiger, Tiger (Laurel Leaf Books 2004). Aurelia, The Emperor Caesar’s daughter leads a pampered, if lonely, life. She is thrilled when her father gives her a young tiger cub for her birthday. With the help of its trainer Julius, Aurelia learns to earn the tiger’s trust. She also learns to trust Julius and welcomes his company as much as she does Boots. Her only other companion is her young cousin Marcus, who wants to impress but often falls short.
Aurelia may be pampered, but she is tender-hearted. She is horrified by the acts of the Circus, wanting nothing to hurt the amazing animals she sees there. She is also strong-willed, even daring to speak her mind (with caution, of course) to her father, who has the ultimate authority of life and death over every citizen in Rome. While Marcus comes across as spoiled and petulant, he is only acting his age–ten. When he most wants to impress Aurelia, he suggests a prank that goes horribly wrong. Boots escapes into the city of Rome. Now Julius must pay with his life as he faces another tiger in the arena–the tiger named Brute.
The streets of Rome swirl with controversy and violence. While Aurelia lives above the dirty streets, she is not immune to their controversy. She is fascinated by the new sect of believers who call themselves Christians. Even though she could have grown up as cold and cruel as her father, Aurelia is kind, especially to animals. Since we experience the circus through her eyes, Banks tempers the excitement and blood lust of the crowds with the horror she experiences at its violence and death. Tiger, Tiger would make a good introduction or companion to the study of Ancient Rome.
The Lions of Little Rock by Kristin Levine
imageWhen I first heard the buzz about The Lions of Little Rock (Scholastic 2012), I thought it would be set during 1957, the first year of school integration and the story of the Little Rock Nine. I was wrong. Instead Kristin Levine weaves a story of friendship that is set during the following year of 1958, when Little Rock closed their high schools in order to prevent further integration of the schools.
When Marlee and Liz becomes friends that year, they never dream that their friendship will test not only their loyalty to each other, but will also take on segregation and put their families in danger when Liz is caught “passing” for white at Marlee’s middle school. No matter that the world is set against their friendship Liz and Marlee reach out to each other and help each other.
Marlee tells the story of their friendship, which is quite remarkable considering that Marlee is too frightened to talk to most people. She even freezes up with her own mother. Liz, however, pushes Marlee to find her voice and to speak up for herself. Marlee teaches Liz how to be quiet. Together, they face the tumultuous changes that come. Marlee misses her big sister Judy, who is sent to live with a grandmother so she can go to school. Liz finds a bit of romance. Marlee joins The Women’s Emergency Committee to Open Our Schools and the Stop This Outrageous Purge campaigns and learns to talk to her mother. Together, they learn that “a friend is someone who helps you change for the better” (289).
More I Survived by Lauren Tarshis
The I Survived series of historical fiction has been extremely popular in my classroom this year. For students who are not sure about historical fiction, they provide a short (less than 100 pages), quick introduction to the genre. Lauren Tarshis chooses some of the most exciting, most dangerous times in history to write about–the Battle of Gettysburg, the Japanese tsunami, the Nazi invasion of Europe. With these dramatic historical events as the background, Tarshis creates a young character who must survive. Whether an escaped slave or a young American overseas, each character is both believable and relatable for modern readers. I already had six of these titles in my classroom library. Now I have extra copies of those six plus three new adventures to share. Here is where–and when–the latest titles will take you.
I Survived the Battle of Gettysburg, 1863 (Scholastic 2013) imageThomas and his little sister Birdie are slaves on a Virginia plantation. When they hear that their master wants to sell Thomas, they flee into the woods to search for freedom. They are lucky enough to meet up with some Union soldiers who take them in. Corporal Henry Green looks out for Thomas and Birdie as they travel with the army and tells them stories of his home in Vermont. Soon the army receives orders to march to Gettysburg. Will Thomas and Birdie survive this bloodiest, deadliest battle of the Civil War?
I Survived the Nazi Invasion, 1944 (Scholastic 2014) When my students first start reading about the Holocaust, many of them ask why the Jews didn’t fight back. The answer is that some Jews–along with Resistance fighters from different countries and faiths–did fight back. Max looks out for his little sister Zena (and she looks out for him, too) while they are trapped in the Jewish ghetto in their town in Poland. After a daring escape, they encounter Resistance fighters, including one who surprises them. As they are traveling to the secret camp deep in the forest, German fighter planes drop bombs throughout the forest and German soldiers sweep through the trees with machine guns. Will Max and Zena survive the explosions and fire and be able to reunite with their family?
I Survived the Japanese Tsunami, 2011 (Scholastic 2013) imageBen, his little brother Harry, and their mother are visiting their dad’s hometown in Japan. The visit brings back painful memories of Ben’s dad, who died a few months earlier in a car crash. But Ben’s memories of his dad and his dad’s stories from the Air Force give Ben the strength and courage to survive the devastating earthquake and tsunami that swept across Japan. The roiling waters rip Ben from his family and he must fight to survive all alone.
If you want even more about these survival stories, check out the Scholastic I Survived Website. You can learn more about each of the disasters, see what I Survived book is coming up next, and even take a quiz to test your survival skills.
The Mighty Miss Malone by Christopher Paul Curtis
imageI first met Deza Malone when I read Bud, Not Buddy. When I learned that Christopher Paul Curtis had written her story, too, I couldn’t wait to read The Mighty Miss Malone (Scholastic 2012). Not only is it a fun story with memorable characters, but it also opens eyes to the challenges of the Great Depression and echoes the challenges that many children and their families face today.
Deza is smart and determined–the perfect narrator to introduce her family and share their story. At first it is a story filled with laughter. Mr. Malone constantly speaks with over-the-top alliteration. Big Brother Jimmie is always up to something–usually something that leads to trouble. Mrs. Malone is the heart of the family and the hope that draws them together no matter how far apart they are.
I laughed through much of this book as Curtis brought to life the entertainment of the Great Depression, from the Joe Louis-Max Schmelling boxing bouts to the Negro Leauge baseball games and singing at speak easies. But It only takes one bit of bad news to throw a family off track–or in this case on the tracks to a hobo camp. No matter how bad their circumstances, Deza never forgets that she is something special. Even as she clings to her promise, she learns to let go.
I enjoyed sharing bits and pieces of this story with my students throughout the day last Friday. I hope I have convinced some of them to give historical fiction a chance.
The Grimm Legacy by Polly Shulman
imageI want a job at the New York Circulating Material Repository. It’s like a library, but it lends out objects of all kinds–teacups and spoons, paintings and sculptures, clothes and wigs (even one of Marie Antoinettes’s wigs). Deep in its basement is a secret collection–the Grimm Collection–where there are shelves and cabinets filled with magical objects straight out the tales from the Brother’s Grimm.
Elizabeth is thrilled when her history teacher recommends her for a job at the Repository, and she can hardly believe it when she learns that magic is real. As is usually the case with magic, things start to go wrong. Some of the items from the Grimm Collection are disappearing or losing their magic. Someone on the inside must be helping the thief, but who can it be? Who can Elizabeth trust? Surely she can count on her new friends Anjali, Marc, and even Aaron. All of them are hiding secrets, and soon their paths lead them to adventure and danger and even romance–but not too much.
I loved this modern take on fairy tale fantasy. What could be more magical than a room full of charmed objects? Well, I would not want the magic mirror (from Snow White’s stepmother) hanging in my bedroom, though I did laugh at the evil images it showed. It may not be able to lie, but that doesn’t mean it has to tell the whole truth. There are fairy tale tropes–an act of kindness to a homeless woman leads to Elizabeth getting the job, and the act of kindness is repaid in a magical way in her time of need. There are evil witches (want anyone turned into a doll? ) and annoying little sisters. There’s even a stepmother and stepsister who, while not evil, make life difficult for Elizabeth.
You never know what you might find lurking in the stacks or flitting between the pages of The Grimm Legacy (Scholastic 2010) by Polly Shulman.
Feathers by Jacqueline Woodson
imageFeathers (Puffin Books 2007) is a quiet book packed with the power of hope. You know hope–the thing with feathers that perches in the soul. Jacqueline Woodson weaves this snippet of poetry from Emily Dickinson throughout Frannie’s story, and in reading it, I find that hope is weaving its way into my thinking, too.
Frannie has much to hope for–or worry about–that snowy winter in the 1970s when she is eleven. Mean girls make fun of her older brother Sean because he is deaf. Her mother is pregnant, and everyone worries she might lose this baby, too. At school, a new boy–a white boy–moves into her class and challenges all of them to reconsider who belongs. She doesn’t hold go much to church, but her best friend Samantha sees Jesus in the new boy.
Through it all, Frannie thinks and thinks and thinks. Woodson’s lyrical prose doesn’t provide all the answers for faith and family and friendship life and death and racism, but her words do sing with hope.
Risked by Margaret Peterson Haddix
imageJonah and Katherine hope to have a little time to spend in the twentieth century before going on another time adventure, but the past catches up with them when Daniella (Anastasia Romanov in 1918) shows up on their doorstep with their friend Chip. Before they know it, Gavin (formerly Alexei Romanov) has whisked them back to Russia on July 16, 1918, where time is running out for the Romanov family. How can Jonah and Katherine save their friends without a fully working Elucidator and without any contact with time agents. Is there any hope at all when modern day scientists have discovered the remains of the entire family, including the bones of Alexei and Anastasia?
Just like the first five books in the series, Risked by Margaret Peterson Haddix is packed with nonstop action and history. Just when Jonah and Katherine come up with one solution, ten more problems pop up, including bad guys Gary and Hodge, who have escaped from time prison and are determined to make their money from selling the missing children from history. As the series progresses (and as the characters grow through their experiences), Haddix explores more of the philosophical issues of time travel and fate and destiny and God.
Of course, we still don’t learn who Jonah was in history, but we do know who he is through his time adventures. We still have a lot of missing children to account for and to save from history.
Graphic Novel Roundup
Pandemonium (Scholastic graphix 2012) by Chris Wooding and Cassandra Diaz
Eleanor and Park by Rainbow Rowell
1 2 3 9
|
__label__1
| 0.709265
|
STATE FRUIT AND PIE
APPLE AND APPLE PIE
No. 15 of the Acts of 1999, effective May 10, 1999, designated the apple pie
as the official State Pie and the apple as the official State Fruit. When
serving apple pie in Vermont, a "good faith" effort shall be made to meet one
or more of the following conditions: (a) with a glass of cold milk, (b) with
a slice of cheddar cheese weighing a minimum of 1/2 ounce, (c) with a large
scoop of vanilla ice cream.
|
__label__1
| 0.999941
|
Friday, August 1, 2014
You are here
Does Africa Really Work?
Chabal and Daloz challenge conventional Western analysis in "Africa Works: Disorder as a Political Instrument".
Share |
Do politicians like Sani Abacha (right) undermine the argument of Chabal and Daloz?
Providing a breath of fresh air from the normal doom and gloom of literature that surrounds Africa, Patrick Chabal and Jean-Pascal Daloz argue that Africa is not in fact broken – it just operates in a different way. With the aim of presenting a paradigm devoid of moral and judgemental undertones, Africa Works explains Africa’s failure to develop in line with Western expectations from a culturally relative perspective. It is an indispensable read for anyone attempting to decipher current day Africa, and provides an alternative explanation for modern day Africa’s shortcomings.
In a continent often characterised by governments that lack competence or commitment, Africa Works looks beneath the modern state in the belief that it was the transition from colonies to independent states that holds the key to unlocking modern day Africa. Although not a book aimed at desecrating the colonial powers, the weakness of the modern African state is largely accredited to the failure of Western institutions to become ingrained during the colonial era.
In particular, Chabal and Daloz believe that it was "questionable whether colonial administration did much to lay the foundations for a properly emancipated state". Similarly to Robert Jackson and Carl Rosberg’s categorisation of African states as "quasi states", Chabal and Daloz argue that the rushed process of decolonisation resulted in African states coming to power without the required features for statehood. They expand on this idea by stating that this weakness, when coupled with the rushed wave of decolonisation that occurred during the 1960s, has allowed for such structures to become "Africanised" after independence.
In contrast to Western predictions that ethnic loyalties would disband with the creation of the state, the two systems instead operated side-by-side, creating a blend of formal and informal structures and a myriad of perceived problems. It is this inability of institutions to withstand social pressures following independence that creates the crux of Chabal and Daloz’s thesis.
Chabal and Daloz focus largely on the correlation between weak states and corruption. Specifically, they argue that it is the weakness of the central state that has acted as a major catalyst for corruption to flourish since independence. This in turn allows for patron-client relationships, as seen prior to colonialism, to continue to be a legitimate function, even "an integral part of the social fabric of life". Although the reality of corruption as a legitimate practice is highly contentious, Chabal and Daloz argue that, if redistributed along socially acceptable lines, it can in fact be an acceptable practice. With this in mind, they warn us that we must "avoid reasoning simplistically in terms of the bureaucratic ideals which we, in the West, assume to have universal relevance".
Africa Works therefore poses a puzzling question: within inefficient states, can informal networks supersede the government as the major service provider? In countries in which resources are scarce, vertical chains of redistribution assist in meeting the needs of the people. Although the patron within this vertical chain undoubtedly finds this relationship to be profitable, there is a social expectation that a percentage of such profits will then be redistributed along kinship or ethnic lines. Relationships are therefore seen as mutually beneficial, for not only the client in need of favours, but also for the patron to uphold their positions of prestige within the community. Within such a relationship, "public opinion legitimises the right kind of personalised exchange" with a failure to distribute being met with suspicion and disdain within the community. Whilst not necessarily fair or equitable, in the absence of a functioning state Chabal and Daloz believe that this is the manner in which Africa works.
Though an interesting theory, Chabal and Daloz’s argument is weaker in practice. For example, in Nigeria capital flight and mass accumulation of wealth by the elite - at the expense of the poor - is clearly evident. Reports that former Nigerian President Abacha and his allies sent billions of dollars offshore between 1988 and 1994 while more and more citizens lived in poverty makes the argument that Africa is "working" questionable.
Although supporters of this thesis will take comfort in such a realisation, it is important to understand that this comes as a major blow to prospects for governance and the creation of strong states. Leaders have a personal stake in maintaining the chaotic systems of governance over which they preside. In a disheartening realisation for many, for Africa’s big men to maintain their complex patron-client networks, the existence of the ineffective state – referred to in Africa Works as the "political instrumentalisation of disorder" – must remain.
Written at a time of rejuvenated Western interest in Africa’s development, Chabal and Daloz’s adoption of a counter-normative approach to analysing Africa offers an interesting, and at times controversial, insight into modern day Africa. Africa Works' attempt to provide a continent-wide appraisal, appealing for those aiming to gain a general overview, does lend itself to contestation. In spite of this, Chabal and Daloz provide an interesting alternate viewpoint for which to view Africa.
Share |
Fantastic review article, very well written. Really sums up the main essence of the book well in a short space and unpacks its complex elements in a straightforward and very readable way. Well done.
|
__label__1
| 0.84531
|
Support The ONELab Fund
The ONELab Fund crystallizes the belief that we are STRONGERTOGETHER.
The new ASCP
ONELab Fund supports all the major initiatives of the ASCP. The ASCP has endeavored to provide excellence in education, certification, and advocacy on behalf of patients, pathologists, and laboratory professionals. Our goal is to raise $30,000. Donating to the ONELab Fund will ensure that the Society can continue to be a leading voice on behalf of our membership.
|
__label__1
| 0.989017
|
Lion Head meatballs
Lion Head meatballs
Lion Head meatballs
Watch Easy Chinese: San Francisco
Friday the 1st, at 09:20
Prep: 30 mins
Cook: 20 mins
Serves: 12
Difficulty: Easy
Ingredients Tick boxes to send shopping list to email
For the meatballs:
For the assembly:
For the basic glutinous rice:
Lion Head meatballs
Notes: This dish was said to be an imperial dish that the emperor ate. It is called Lion Head meatballs because, once cooked, the meatballs are surrounded by Chinese cabbage, and the meatball is said to resemble the head of the lion, while the long pieces of cabbage resemble the 'mane' of the lion.
My mother can be quite superstitious and when she cooked this dish when I was younger she told us that we would be as strong as lions if we ate it. It worked. This is something I plan to cook and share if I have children one day.
Serve with steamed rice, as the rice helps to soak up the juices of the broth.
1) For the meatballs: put the ground beef, rice wine, garlic, spring onions, egg, ginger, soy sauce, sesame oil, cornflour, salt, and white pepper into a large bowl to combine, stirring in the same direction.
2) Using wet hands, scoop a large mound of the ground meat mixture, and mold it into a ball. The size should be a little larger than a golf ball. Transfer the meatball to a plate and repeat with the remaining mixture.
3) For the assembly: pour the groundnut oil into a large deep pan, and heat over a high heat. Using a metal ladle, carefully lower each meatball into the oil, and spoon some of the oil over the meatballs. Cook for 4 to 5 minutes, or until browned.
Cook's Note: Steamed or glutinous rice is a perfect accompaniment to this dish.
6) Heat a pan, add the rice and water, cover, and cook over high heat for 15 minutes.
7) Reduce the heat to very low, and cook for an additional 3 minutes, making sure all the water has evaporated. Remove from the heat and, using a spatula, fluff the rice. It is now ready to serve.
|
__label__1
| 0.973908
|
HomeAbout UsPastor HobbsLady HobbsMinistriesEmpowering PeopleTransformational TeachingRevitalizing Worship
Our Vision and Mission
We, the Metropolitan Baptist Church Media Ministry, strive to enhance the "Ministry That Makes a Difference" through audio, video, and lighting. We strive to make a difference in the world by ministering to the social, emotional and physical needs of those in the church and the community through sight, live sound and social media. We will always seek to empower others by assisting them to utilize and maximize their God-given talents and gifts. We strive to create an environment that embraces effective teaching and learning. We will provide support to ensure that our worship experience is purposeful and powerful by serving with order and excellence and exhibiting the highest level of ethics, integrity and conduct that is representative of the God we serve.
The "METRO" Media Ministry
|
__label__1
| 0.996572
|
chlorine(Cl), chemical element, second lightest member of the halogen elements, or Group VIIa VIIA of the periodic table.
Chlorine is a toxic, corrosive, greenish yellow gas that is irritating to the eyes and respiratory system; it is two and a half times heavier than air. It becomes a liquid at -34° C (-29° F). First prepared from hydrochloric acid and manganese dioxide in 1774 by Carl Wilhelm Scheele, it was considered a compound until Sir Humphry Davy showed (1810) that it cannot be decomposed and that muriatic (hydrochloric) acid consists of hydrogen and another true element that he named chlorine.
Chlorine constitutes about 0.013 percent of the Earth’s crust. Free chlorine has been reported as a very minor constituent of volcanic gases, of which hydrogen chloride (q.v.) is a fairly common component. Chlorine, as the chloride ion Cl-, is the main negative ion in ocean water (1.9 percent by weight) and in inland seas such as the Caspian Sea, the Dead Sea, and the Great Salt Lake of Utah; it is found in evaporite minerals, for example, combined with sodium, as rock salt (halite) and in the minerals chlorapatite and sodalite. Natural chlorine is a mixture of two stable isotopes: chlorine-35 (75.53 percent) and chlorine-37 (24.47 percent). The Chloride chloride ion is present in the body fluids of higher animals and as hydrochloric acid in the digestive secretions of the stomach.
Chlorine molecules are composed of two atoms (Cl2). Chlorine combines directly with almost all the elements (exceptions are oxygen, fluorine, nitrogen, carbon, and the noble gases) , except for the lighter noble gases, to give chlorides; those of most metals are ionic crystals, whereas those of the semimetals and nonmetals are predominantly molecular. Besides the -1 oxidation state of the chlorides, chlorine also exhibits +1, +3, +5, +7 oxidation states, respectively, in the following ions: hypochlorite, ClO-1.5PT; chlorite, ClO-2 ; chlorate, ClO-3 ; and perchlorate, ClO-4 . Four Five oxides, chlorine monoxide (Cl2O), chlorine dioxide (ClO2), chlorine perchlorate (Cl2O4) dichlorine hexoxide (Cl2O6), and dichlorine heptoxide (Cl2O7), all highly reactive and unstable, have been indirectly synthesized. Chlorine can displace the heavier halogens, bromine and iodine, from their ionic compounds and undergoes addition or substitution reactions with organic compounds. Chlorine enters directly or as an intermediate into the synthesis of many organic chemicals that are used as solvents, dyes, plastics, and synthetic rubber.
atomic number17atomic weight35.453melting point-103° C (-153° F)boiling point-34° C (-29° F)density (1 atm, 0° C)3.214 g/litreoxidation states-1, +1, +3, +5, +7electronic config.2-8-7 or 1s22s22p63s23p1s22s22p63s23p5
|
__label__1
| 0.885688
|
Nonprofit Board Talk
Nonprofit Board Discussion – What is Cloud Computing?
It’s difficult to have a true discussion on cloud computing if most of the people in the room don’t know what it is. It’s a buzz phase so everyone has heard of it but how many board members really know what it means? I’m a person with an IT background so I’m usually asked to explain what cloud computing is. I can see faces change as I explain it and understanding hits.
Most nonprofit boards will face this question at some point. Here’s a short version of the explanation I give to this question. I hope it helps when your board has the discussion. The explanation is simple. The best way to understand cloud computing is to compare it to the other forms of computing available to most nonprofits:
“Local” Computing – You are computing locally if all your programs (or software) and data is stored on your PC’s (or laptop’s) hard drive. If you have a flash drive or external hard drive, you are still computing “locally”.
Server Computing (or Client/Server Computing) – Your nonprofit owns or leases a server. When you connect to the office network, you can open files stored on that server. In this case, the programs (Microsoft Word, Microsoft Excel, etc.) are installed on your PC but you store the files (or data) on the server. This is very common with databases.
Enterprise Computing – In this case, both the software and the data is stored on your office server. All the user has to do is type a web address. You don’t have to make sure the software in installed first. (There are exceptions to this but that’s another blog post.)
The key here is your nonprofit owns or leases the server. The server is in your office or downstairs in the basement or at the data center. You can see it, hug it, or take a picture of it. You have a staff person or contractor that has to maintain it. From time-to-time, you have to fix it or replace it. The good part is, you have a server that gives you extended computing power. The bad part is, you have a costly server that requires specialized skills to maintain.
Cloud Computing (or Cloud Services) – Do you want the extended computing power without the costly server? Cloud computing can do it! There are companies with data centers full of servers. You can “rent” or “share” space on those servers. You can get access to the software on those servers. Just sign up as a customer and type in a web address. Google Docs, Microsoft 360, Yahoo Mail, Evernote, and are all cloud services. When you log into your account to get your data, you have no idea where that server is located. That’s cloud computing!
This is a VERY simple explanation of cloud computing. Experts spend hours talking about the types of service, levels of service, software options and vendors available in the cloud world? This explanation is only to begin the discussion. You need advice and support from experts as you move into the cloud. Good luck on the journey!
Thanks for reading the Nonprofit Board Talk Blog! Follow on Twitter @NPBoardTalk
Brent Jackson
|
__label__1
| 0.618264
|
1. Technology
What is an ESD File?
Question: What is an ESD File?
Did you find an ESD file on your computer and wonder what program should open it? Maybe someone emailed you an ESD file but you're not sure how to use it. Perhaps you tried to open the ESD file but Windows told you that it could not open it.
Before you can open an ESD file (assuming it's even a file format that's intended to be viewed or edited), you'll need to determine what kind of file the .ESD file extension refers to.
Answer: A file with the ESD file extension is an ExpertScan Survey Document file.
Other types of files may also use the ESD file extension. If you know of any additional file formats that use the .ESD extension, please let me know so I can update this information.
How To Open an ESD File
The easiest way to open an ESD file is to double-click on it and let your PC decide which default application should open the file. If no program opens the ESD file then you probably don't have an application installed that can view and/or edit ESD files.
ESD files can be opened with Expert Scan, by AutoData.
Some ESD files are from Microsoft when downloading software upgrades. These files can then be opened in Windows without any additional software.
If you know anything else useful about ESD files, please let me know so I can update this page.
Tip: Use Notepad or another text editor to open the ESD file. Many files are text-only files meaning no matter the file extension, a text editor may be able to properly display the file's contents. This may or may not be the case with ESD files but it's worth a try.
If you find that an application on your PC does try to open the ESD file but it's the wrong application or if you would rather have another installed program open ESD files, see my How To Change the Default Program for a Specific File Extension guide for making that change in Windows.
How To Convert an ESD File
There are two main ways to attempt to convert an ESD file to another file type:
The first option involving opening the ESD file in its native program is preferable because it's both easier and will probably result in a more accurate file conversion. Of course if you don't have a program that opens ESD files, a third-party file conversion tool (the second option) could be very useful.
Important: You cannot usually change a file extension (like the ESD file extension) to one that your computer recognizes and expect the newly renamed file to be usable. An actual file format conversion using one of the methods described above must take place in most cases.
Still Having Problems Opening or Using an ESD File?
See Get More Help for information about contacting me on social networks or via email, posting on tech support forums, and more. Let me know what kinds of problems you're having with opening or using the ESD file and I'll see what I can do to help.
©2014 About.com. All rights reserved.
|
__label__1
| 0.977351
|
Flooding in Venice, tourists swimming
AP Photo/Luigi Costantini
It's true that canal-lined Venice is known for its regular flooding, but usually that means residents and tourists shuffle through ankle-deep water. This week, however, nearly three quarters of the city faced floods nearing the five-foot mark after an onslaught of rain and bad weather hit northern Italy, according to Reuters.
Two hundred people were forced to evacuate from their homes in Tuscany, and shops, homes and palaces were inundated with water in Venice. Water levels reached 149 cm (5ft)—the sixth highest level since records began in 1872.
While residents desperately tried to save their homes and possessions, tourists seemed to revel in the flooding, sitting at cafe tables in their bathing suits, playing in the waist-deep water, and swimming through St. Mark's square.
|
__label__1
| 0.999424
|
Browse Cal Poly
Cal Poly Alcohol Policy
Students of any age are not allowed to consume, possess or dispense alcohol on campus except by exclusive permission of the Cal Poly Corporation.
Campus Administrative Manual 270.1
Possession or consumption of alcoholic beverages on the campus is prohibited. Exception to this policy may be granted by the President or his designee to allow the service (sale or nonsale) of alcoholic beverages under established guidelines. Factors to be considered in granting exceptions include the nature of the event, the adequacy of supervision, and the benefit to the university. Exceptions will not be granted for events open to the public, unless by the President or a designee for bona fide public eating places.
Campus Administrative Manual 270.2
Service of alcoholic beverages at campus events shall be the exclusive privilege of the Cal Poly Corporation. The Cal Poly Corporation may grant exceptions to this privilege as appropriate.
Alcohol and Other Drug Protocol: Student Response Procedures
A student should not hesitate to report an incident of possible alcohol poisoning or other drug overdose due to concerns about potential disciplinary action for violating the Standards for Student Conduct. Student safety and health are paramount considerations. Obtaining necessary medical assistance could be considered a mitigating factor on a case-by-case basis when evaluating the imposition of campus disciplinary charges for consuming or providing alcohol or other drugs. Even if no disciplinary charges are imposed, students may still be required to participate in educational programs designed to promote student safety. This protocol does not preclude disciplinary action for other violations such as assault, hazing, or sexual misconduct that might arise from the same incident.
A student reporting another student's alcohol poisoning or other drug overdose must take the following steps:
1. Contact emergency personnel immediately by calling 911;
2. Stay with the incapacitated student until told but the responding officials to leave;
3. Cooperate with emergency personnel and University employees during the incident and during any subsequent investigation.
If the consumption of alcohol or other drugs occurred during an event sponsored, organized, or supported by a student group or club, Cal Poly will consider the reporting of the incident as a mitigating factor when determining any disciplinary action imposed on the student group or club. Other mitigating circumstances could include the efforts made by hosts or officers to prevent the situation, participation in Cal Poly educational programs designed to prevent such incidents, and cooperation with any Cal Poly investigation of the incident. Conversely, failure to report such an occurrence would be considered an aggravating factor when imposing any disciplinary sanctions.
aware awake al!ve provides information about caring for others
|
__label__1
| 0.836437
|
Psychology Wiki
Changes: Thomas Hobbes
Back to page
(started tidy)
Line 23: Line 23:
'''Thomas Hobbes''' (April 5, [[1588]]–December 4, [[1679]]) was an [[English (people)|English]] [[philosophy|philosopher]], whose famous 1651 book ''[[Leviathan (book)|Leviathan]]'' set the agenda for nearly all subsequent Western [[political philosophy]].
'''Thomas Hobbes''' (April 5, 1588–December 4, 1679) was an [[English (people)|English]] [[philosophy|philosopher]], whose famous 1651 book ''[[Leviathan (book)|Leviathan]]'' set the agenda for nearly all subsequent Western [[political philosophy]].
Although Hobbes is today best remembered for his work on [[political philosophy]], he contributed to a diverse array of fields, including history], geometry, [[ethics]], general philosophy and what would now be called political science. Additionally, Hobbes's account of human nature as self-interested cooperation has proved to be an enduring theory in the field of [[philosophical anthropology]].
Latest revision as of 19:20, April 24, 2010
Western Philosophers
17th-century philosophy
(Modern Philosophy)
Thomas Hobbes (portrait)
Thomas Hobbes
Name: Thomas Hobbes
Birth: April 5, 1588 Malmesbury, Wiltshire, England
Death: December 4, 1679 Derbyshire]], England
School/tradition: Social contract, realism
Main interests
Political philosophy, history, ethics, geometry
Notable ideas
Plato, Aristotle |
All subsequent Western political philosophy
Although Hobbes is today best remembered for his work on political philosophy, he contributed to a diverse array of fields, including history], geometry, ethics, general philosophy and what would now be called political science. Additionally, Hobbes's account of human nature as self-interested cooperation has proved to be an enduring theory in the field of philosophical anthropology.
Early life and educationEdit
Hobbes was born in Westport, Wiltshire, England on April 5, 1588 (some sources say Malmesbury). His father, the vicar of Charlton, and Westport, was forced to leave the town, abandoning his three children to the care of an older brother Francis. Hobbes was educated at Westport church from the age of four, passed to the Malmesbury school and then to a private school kept by a young man named Robert Latimer, a graduate from [Oxford University. Hobbes was a good pupil, and around 1603 he was sent to Oxford and entered at Magdalen Hall The principal of Magdalen was the aggressive Puritan John Wilkinson, and he had some influence on Hobbes.
At university, Hobbes appears to have followed his own curriculum; he was "little attracted by the scholastic learning". He did not complete his degree until 1608, but he was recommended by Sir James Hussee, his master at Magdalen, as tutor to William, the son of William Cavendish, Baron of Hardwick (and later Earl of Devonshire), and began a lifelong connection with that family.
Hobbes became a companion to the younger William and they both took part in a Grand Tour in 1610. Hobbes was exposed to European scientific and critical methods during the tour in contrast to the scholastic philosophy which he had learned in Oxford. His scholarly efforts at the time were aimed at a careful study of classic Greek and Latin authors, the outcome of which was, in 1628, his great translation of Thucydides's History of the Peloponnesian War, the first translation of that work into English. Hobbes believed that Thucydides's account of the Peloponnesian War showed that democratic government could not survive war or provide stability and was thus undesirable.
In ParisEdit
Civil war in EnglandEdit
The English Civil War broke out in 1642, and when the Royalist cause began to decline from the middle of 1644 there was an exodus of the king's supporters to Europe. Many came to Paris and were known to Hobbes. This revitalised Hobbes's political interests and the De Cive was republished and more widely distributed. The printing was begun in 1646 by Samuel de Sorbiere through the Elzevir press at Amsterdam with a new preface and some new notes in reply to objections.
The company of the exiled royalists led Hobbes to produce an English book to set forth his theory of civil government in relation to the political crisis resulting from the war. It was based on an unpublished treatise of 1640. The State, it now seemed to Hobbes, might be regarded as a great artificial man or monster (Leviathan), composed of men, with a life that might be traced from its generation under pressure of human needs to its dissolution through civil strife proceeding from human passions. The work was closed with a general "Review and Conclusion," in direct response to the war which raised the question of the subject's right to change allegiance when a former sovereign's power to protect was irrecoverably gone. Also he took advantage of the Commonwealth to indulge in rationalistic criticism of religious doctrines. The first public edition was titled Elementa philosophica de cive.
Main article: Leviathan (book)
File:Leviathan gr.jpg
In Leviathan, Hobbes set out his doctrine of the foundation of societies and legitimate governments. In the natural condition of mankind, while some men may be stronger or more intelligent than others, none is so strong and smart as to be beyond a fear of violent death. When threatened with death, man in his natural state cannot help but defend himself in any way possible. Self-defense against violent death is Hobbes' highest human necessity, and rights are borne of necessity. In the state of nature, then, each of us has a right to everything in the world. Due to the scarcity of things in the world, there is a constant, and rights-based, "war of all against all" (bellum omnium contra omnes). Life in the state of nature is "solitary, poor, nasty, brutish, and short" (xiii).
But war isn't in man's best interest. According to Hobbes, man has a self-interested and materialistic desire to end war — "the passions that incline men to peace are fear of death, desire of such things as are necessary to commodious living, and a hope by their industry to obtain them" (xiii, 14). He forms peaceful societies by entering into a social contract. According to Hobbes, society is a population beneath an authority, to whom all individuals in that society covenant just enough of their natural right for the authority to be able to ensure internal peace and a common defense. This sovereign, whether monarch, aristocracy or democracy (though Hobbes prefers monarchy), should be a Leviathan, an absolute authority. Law, for Hobbes, is the enforcement of contracts. The political theory of Leviathan varies little from that set out in two earlier works, The Elements of Law and De Cive (On The Citizen). (A minor aside: Hobbes almost never uses the phrase "state of nature" in his works.)
Hobbes's leviathan state is infinitely authoritative in matters pertaining to aggression, one man waging war on another, or any matters pertaining to the cohesiveness of the state. It should say nothing about what any man does otherwise; so long as one man does no harm to any other, the sovereign should keep its hands off him (however, since there is no power above the sovereign, there is nothing to prevent the sovereign breaking this rule). In actuality, however, the extent to which this sovereign may exercise this authority is conditioned by the sovereign's obligations to natural law. Although the sovereign has no legislative obligations, it is more beneficial for him to abide by those laws which prescribe peace for security (the laws of nature.) Thus this conditions the authority of the sovereign with a prudential morality, or, more accurately, a moral obligation. A sovereign also maintains equality within the state, since the common people would be "washed out" in the glare of their sovereign; Hobbes likens this "washing out" of the common people in their sovereign's presence to the fading of the stars in the presence of the sun. In essence, Hobbes's political doctrine is "do no harm." His negative version of the Golden Rule, in chapter xv, 35, reads: "Do not that to another, which thou wouldst not have done to thyself." This is contrasted with the Judeo-Christian golden rule, which encourages actively doing unto others: for Hobbes, that is a recipe for social chaos.
The word "Hobbesian" is sometimes used in modern English to refer to a situation in which there is unrestrained, selfish, and uncivilised competition. This usage, now well-established, is misleading for two reasons: first, the Leviathan describes such a situation, but only in order to criticise it; second, Hobbes himself was timid and bookish in person. Other uses, popular immediately after Hobbes published, carry connotations of atheism and the belief that "might makes right."
With BramhallEdit
Hobbes now turned to complete the fundamental treatise of his philosophical system. He worked so steadily that De Corpore was first printed in 1654. Also 1654 a small treatise, Of Liberty and Necessity was published by Bishop John Bramhall addressed at Hobbes. Bramhall, a strong Arminian, had met and debated with Hobbes and afterwards wrote down his views and sent them privately to be answered in this form by Hobbes. Hobbes duly replied, but not for publication. But a French acquaintance took a copy of the reply and published it with "an extravagantly laudatory epistle". Bramhall countered in 1655, when he printed everything that had passed between them (under the title of A Defence of the True Liberty of Human Actions from Antecedent or Extrinsic Necessity). In 1656 Hobbes was ready with his Questions concerning Liberty, Necessity and Chance, in which he replied "with astonishing force" to the bishop. As perhaps the first clear exposition of the psychological doctrine of determinism, Hobbes's own two pieces were important in the history of the free-will controversy. The bishop returned to the charge in 1658 with Castigations of Mr Hobbes's Animadversions, and also included a bulky appendix entitled The Catching of Leviathan the Great Whale. Hobbes never took any notice of the Castigations.
With WallisEdit
Beyond the spat with Bramhall, Hobbes was caught in a series of conflicts from the time of publishing his De Corpore in 1655. In Leviathan he had assailed the system of the original universities. In 1654 Seth Ward (1617-1689), the Savilian professor of astronomy, replying in his Vindiciae academiarum to the assaults by Hobbes and others (especially John Webster) on the academic system. Errors in De Corpore, especially in the mathematical sections, opened Hobbes to criticism from John Wallis, Savilian professor of geometry. Wallis's Elenchus geomeiriae Hobbianae, published in 1655 contained an elaborate criticism of Hobbes's whole attempt to put the foundations of mathematical science in its place within the general body of reasoned knowledge - a criticism which exposed the utter inadequacy of Hobbes's mathematics. Hobbes's lack of rigour meant that he spent himself in vain attempts to solve the impossible problems that often waylaid self-sufficient beginners, his interest was limited to geometry and he never had any notion of the full scope of mathematical science. He was unable to work out with any consistency the few original thoughts he had, and thus was an easy target. Hobbes took care to remove some of the worst mistakes exposed by Wallis, before allowing an English translation of the De Corpore to appear in 1656. But he still attacked Wallis in a series of Six Lessons to the Professors of Mathematics in 1656.
However, in response to the more personal attacks Hobbes wrote a letter about himself in the third person, Considerations upon the Reputation, Loyalty, Manners and Religion of Thomas Hobbes. In this biographical piece, he told his own and Wallis's "little stories during the time of the late rebellion" with such effect that Wallis did not attempt a reply.
With geometersEdit
Later lifeEdit
The king was important in protecting Hobbes when, in 1666, the House of Commons introduced a bill against atheism and profaneness. On October 17 of that year, it was ordered that the committee to which the bill was referred "should be empowered to receive information touching such books as tend to atheism, blasphemy and profaneness... in particular... the book of Mr. Hobbes called the Leviathan." ( House of Commons Journal Volume 8. British History Online. URL accessed on January 14, 2005.) Hobbes was terrified at the prospect of being labelled a heretic, and proceeded to burn some of his compromising papers. At the same time, he examined the actual state of the law of heresy. The results of his investigation were first announced in three short Dialogues added as an Appendix to his Latin translation of Leviathan, published at Amsterdam in 1668. In this appendix, Hobbes aimed to show that, since the High Court of Commission had been put down, there remained no court of heresy at all to which he was amenable, and that nothing could be heresy except opposing the Nicene Creed, which, he maintained, Leviathan did not do.
In October 1679, Hobbes suffered a bladder disorder, which was followed by a paralytic stroke from which he died in his ninety-second year. He was buried in the churchyard of Ault Hucknall in Derbyshire, England.
Selected bibliography Edit
Hobbes in popular culture Edit
Quotations Edit
• Strauss, Leo (1959). "On the Basis of Hobbes's Political Philosophy," in What Is Political Philosophy?, Glencoe, Ill.: The Free Press, chap. 7.
External linksEdit
Wikimedia Commons has media related to:
Wikisource has original works written by or about:
Wikiquote has a collection of quotations related to:
bs:Thomas Hobbes bg:Томас Хобс cs:Thomas Hobbes cy:Thomas Hobbes da:Thomas Hobbes de:Thomas Hobbes et:Thomas Hobbes es:Thomas Hobbes eo:Thomas Hobbes fa:توماس هابز fr:Thomas Hobbes gl:Thomas Hobbes ko:토머스 홉스 hr:Thomas Hobbes is:Thomas Hobbeshe:תומס הובס mk:Томас Хобс nl:Thomas Hobbesno:Thomas Hobbespt:Thomas Hobbes ro:Thomas Hobbes ru:Гоббс, Томас simple:Thomas Hobbes sk:Thomas Hobbes sr:Томас Хобс fi:Thomas Hobbes sv:Thomas Hobbes th:โทมัส ฮอบบส์zh:托马斯·霍布斯
Around Wikia's network
Random Wiki
|
__label__1
| 0.530977
|
INSIDER – Favors minutes compared to his draft class
Since posting the surprising numbers of Favors minutes compared to similar bigs in recent years numerous people have said what about Favors draft class. It does feel as though Favors has been held back in his playing time compared to his draft class.
Both DeMarcus Cousins and Greg Monroe have been integral starting players for their respective teams. Ed Davis who was drafted by Toronto and since traded to Memphis has had consistent playing time as well. However, both Cousins and Monroe entered the league a year older than Favors as did Ed Davis. Other big men in the draft were Ekpe Udon ,23 and Cole Aldrich was 22.
When equalizing his draft class Favors has still played more minutes by the same age. Favors total minutes as of 21 years old, 4,698 surpass Greg Monroe and DeMarcus Cousins.
Additionally, surprising is how close Favors is in production to Greg Monroe when you equalize for minutes played. They both are taking the same shots per minute, rebounding the same and scoring at similar rates. Favors blocks more shots. Cousins 44% shooting is abysmal.
favors compared to draft class
In conclusion, I don’t disagree that Favors could have played more or that Millsap and Jefferson presence restricted his minutes on the floor. However, these last two comparisions show very clearly that Favors is not behind in development or that his development has been stunted in any way.
If you would you like to discuss this please do at the Locked on Sports Google + Community page
|
__label__1
| 0.947896
|
Discussion Forum
Studies Enrolling Subjects
ClinicalTrials.gov provides searchable information on Clinical Trials and Human Research Studies. Click here for the Trial List for a search on “Congenital Heart Disease.”
Click here to visit CenterWatch, a source of clinical trials information for both clinical research professionals and patients.
Quality of Life in Adults with Atrial Septal Defects
What is the purpose of the study?
The goal of this study is to explore the quality of life in adults newly diagnosed with an atrial septal defect (ASD). An ASD is a hole between the upper chambers of the heart.
Who is eligible?
Newly diagnosed adults (21 years of age or older) with an ASD that will be repaired in the cardiac catheterization lab who can speak, read and write in English.
What factors exclude eligibility?
Adults with any other type of congenital heart defect will be excluded.
What are the major risks and benefits of participation?
There is a potential minimal risk of the loss of confidentiality or privacy through your participation in this study. There may be no direct benefit to you for being in this study, but others may benefit in the future from your participation.
What is the time commitment?
You will be asked to complete five questionnaires at three different times, for a total of 12 questionnaires: Before ASD closure in the catheterization lab, one month after ASD closure, and six months post-ASD closure. It should take about 25-35 minutes to complete the questionnaires. You will receive a $15 gift card after you answer the pre-closure questionnaires and a $10 gift card after you have completed the study.
How do people interested in joining the study get involved?
Interested participants should email Mary Heitschmidt RN, APN, at [email protected] or call her at 312-942-9615.
|
__label__1
| 0.999628
|
Diode switching circuits
Diodes can perform switching and digital logic operations. Forward and reverse bias switch a diode between the low and high impedance states, respectively. Thus, it serves as a switch.
Diodes can perform digital logic functions: AND, and OR. Diode logic was used in early digital computers. It only finds limited application today. Sometimes it is convenient to fashion a single logic gate from a few diodes.
Diode AND gate
An AND gate is shown in Figure above. Logic gates have inputs and an output (Y) which is a function of the inputs. The inputs to the gate are high (logic 1), say 10 V, or low, 0 V (logic 0). In the figure, the logic levels are generated by switches. If a switch is up, the input is effectively high (1). If the switch is down, it connects a diode cathode to ground, which is low (0). The output depends on the combination of inputs at A and B. The inputs and output are customarily recorded in a “truth table” at (c) to describe the logic of a gate. At (a) all inputs are high (1). This is recorded in the last line of the truth table at (c). The output, Y, is high (1) due to the V+ on the top of the resistor. It is unaffected by open switches. At (b) switch A pulls the cathode of the connected diode low, pulling output Y low (0.7 V). This is recorded in the third line of the truth table. The second line of the truth table describes the output with the switches reversed from (b). Switch B pulls the diode and output low. The first line of the truth table recordes the Output=0 for both input low (0). The truth table describes a logical AND function. Summary: both inputs A and B high yields a high (1) out.
A two input OR gate composed of a pair of diodes is shown in Figure below. If both inputs are logic low at (a) as simulated by both switches “downward,” the output Y is pulled low by the resistor. This logic zero is recorded in the first line of the truth table at (c). If one of the inputs is high as at (b), or the other input is high, or both inputs high, the diode(s) conduct(s), pulling the output Y high. These results are reordered in the second through fourth lines of the truth table. Summary: any input “high” is a high out at Y.
OR gate: (a) First line, truth table (TT). (b) Third line TT. (d) Logical OR of power line supply and back-up battery.
A backup battery may be OR-wired with a line operated DC power supply in Figure above (d) to power a load, even during a power failure. With AC power present, the line supply powers the load, assuming that it is a higher voltage than the battery. In the event of a power failure, the line supply voltage drops to 0 V; the battery powers the load. The diodes must be in series with the power sources to prevent a failed line supply from draining the battery, and to prevent it from over charging the battery when line power is available. Does your PC computer retain its BIOS setting when powered off? Does your VCR (video cassette recorder) retain the clock setting after a power failure? (PC Yes, old VCR no, new VCR yes.)
Analog switch
Diodes can switch analog signals. A reverse biased diode appears to be an open circuit. A forward biased diode is a low resistance conductor. The only problem is isolating the AC signal being switched from the DC control signal. The circuit in Figure below is a parallel resonant network: resonant tuning inductor paralleled by one (or more) of the switched resonator capacitors. This parallel LC resonant circuit could be a preselector filter for a radio receiver. It could be the frequency determining network of an oscillator (not shown). The digital control lines may be driven by a microprocessor interface.
Diode switch: A digital control signal (low) selects a resonator capacitor by forward biasing the switching diode.
The large value DC blocking capacitor grounds the resonant tuning inductor for AC while blocking DC. It would have a low reactance compared to the parallel LC reactances. This prevents the anode DC voltage from being shorted to ground by the resonant tuning inductor. A switched resonator capacitor is selected by pulling the corresponding digital control low. This forward biases the switching diode. The DC current path is from +5 V through an RF choke (RFC), a switching diode, and an RFC to ground via the digital control. The purpose of the RFC at the +5 V is to keep AC out of the +5 V supply. The RFC in series with the digital control is to keep AC out of the external control line. The decoupling capacitor shorts the little AC leaking through the RFC to ground, bypassing the external digital control line.
With all three digital control lines high (≥+5 V), no switched resonator capacitors are selected due to diode reverse bias. Pulling one or more lines low, selects one or more switched resonator capacitors, respectively. As more capacitors are switched in parallel with the resonant tuning inductor, the resonant frequency decreases.
The reverse biased diode capacitance may be substantial compared with very high frequency or ultra high frequency circuits. PIN diodes may be used as switches for lower capacitance.
|
__label__1
| 0.999601
|
Patent Details
Navigation and fingerprint sensor
A pressure sensitive cursor control suitable for applications that include cellular phones and personal data assistants includes a pressure sensor array suitable to detect a human fingerprint. Cursor control is provided by subtle finger movement. Sequential images of the finger are captured and compared to determine planar movement or data entry. Performance may be improved by sampling zones within the captured image and comparing the zones with those in an earlier image. Performance could also be improved by subsampling the array. While the full resolution of the pressure-sensing array is needed to capture ones fingerprint and execute an authentication function only a subsampled image from the array is needed to derive meaningful navigation data. The pressure sensor array is designed on a glass substrate in order to drive down the unit cost. The silicon companion chip where the data is interpreted also drives the array and can therefore sub-sample the array when navigating and/or get a full resolution image when authenticating.
Report Generation Date:
Patents to Consider:
|
__label__1
| 0.680685
|
Gregory Ferguson represented me through the mediation process in a sexual harassment case involving a coworker. I felt supported and protected from retaliation ONLY during the time I was being represented by Mr. Ferguson. He was knowledgeable and diligent and saw to it that my former employers ceased the harassment that had continued throughout my ordeal. While it was my personal choice to settle at the time of mediation due to the toll the experience has taken prior to being represented, my attorney build a strong case and was ready and willing to move forward with it.
|
__label__1
| 0.980728
|
17 Commodity and Securities Exchanges 1 2004-04-01 2004-04-01 false DELIVERY PERIOD REQUIRED 100 PART 100 Commodity and Securities Exchanges COMMODITY FUTURES TRADING COMMISSION Pt. 100 PART 100—DELIVERY PERIOD REQUIRED Authority:
§ 100.1 Delivery period required with respect to certain grains.
[41 FR 3211, Jan. 21, 1976]
|
__label__1
| 0.937781
|
For an abbreviated overview of the Conference, click here.
Professional Development Workshop Set 1
Your Session ROI
Geno Church, word-of-mouth inspiration officer at Brains on Fire, will explain why the time is now for businesses to go beyond the product conversation to understanding, sparking and sustaining “the passion conversation,” or why your business is in business.
|
__label__1
| 0.997524
|
Costs + Facial Plastic Surgery
Narrow 53 questions by:
Sort by:
• Most visited
• Recent
• Answers
How Much Does Forehead Reduction Surgery Cost?
Brow Bone Reduction Procedure and Costs
Solutions for Deepset 'Sunken' Eyes and Flat Cheeks?
Risks of Hydroxyapatite Cranial Implant?
I have asked before that, I am seeking forehead augmentation for my receded and very flat forehead. I have read that hydroxyapatite is an option. Then... READ MORE
What is the Average Cost Range for Tear Trough Implants?
Just wanted to know the minimum and maximum price for this surgical procedure please. READ MORE
How Much Does Jaw Shaving Cost?
I Hate my Narrowface, &want Widen Cheek& Brows Area As MUCH As Poss! &longlasting As Poss!
How can I drastically widen my cheek to brow area, to change my face from unattractively narrow to fully heart-shaped? I want to go for it all the... READ MORE
Brow Bone Augmentation Consultation? (photo)
I'm looking to have forehead implant surgery + brow bone augmentation + nasal implant surgery to build up the nose bridge and for a more protruding... READ MORE
Apart from paying for the anesthesia once for both multiple procedures, can you get discount for having multiple procedures. For example, let's say... READ MORE
Brown Bone Reduction - Cost - Risk - Results
I am a male with a prominent brow bone and I was wondering if it would be possible to get the same results as the simulated image below. I was also... READ MORE
Is There a Surgery Which Can Reduce the Size of my Forehead?
I've heard of browlifts but that sounds like only raising my eyebrows when I want my actual hairline about 2cm shorter (6.5cm currently) If there is,... READ MORE
What Would the Estimated Cost for a Nose Job, Cheek Implants, and Chin Augmentation Be?
I want to have all of these surgeries done at once, what would the estimated cost be? READ MORE
Considering Brow Furrow and Under Eye Procedure. What Are My Options And The Cost? (photo)
Photo on left taken in 2005, photo on right taken 2009 I am 45 yeaers old now, never had any kind of cosmetic surgery, I would like to regain the look... READ MORE
Recommended Procedures to Achieve Younger Face?
Temple Implant or Fat Grafting For Concave Temples?
Can Jawline Bone Be Removed and What Does It Cost?
I feel my jaw line is to much in side profiles. No fat or double chin. Can bone be removed? What purcedure is it called when some of the jaw line bone... READ MORE
How Much Should It Cost for Brow Bone Redution in India?
I have a bump on my forehead which looks extremely awful would be glad if i am able to get it straight at a rite price. READ MORE
Skull Cranioplasty and Forehead Augmentation Using Kryptonite?
Hello My occipital zone in the right side is not symmetric as that at the left. It's more flat. I want to round it. I want to augment it using... READ MORE
No matching results
|
__label__1
| 0.901738
|
Do all cockroaches have wings?
More Info:
cockroaches Phyla Protostome
Insect wing
The physical dynamics of flight are composed of direct and indirect flight. Those species that employ direct flight have wing muscles directly attached to the wing base, so that a small downward movement of the wing base lifts the wing itself upward. However, insects with indirect flight have muscles that attach to the thorax and deform it; since the wings are extensions of the thoracic exoskeleton, the deformations of the thorax cause the wings to move as well.
Oggy and the Cockroaches
Oggy and the Cockroaches (also known as Oggy et les Cafards in French, often shortened to Oggy) is a French/American animated comedy series produced by Xilam and Gaumont Film Company.
The Pennsylvania wood cockroach (Parcoblatta pennsylvanica) is a common species of roach in Eastern North America.
Adult males are approximately 1 inch long; females grow to about 3/4 inch long. Males are dark brown; the sides of the thorax and the front half of the wings are margined with yellow. Adult males are fully winged, while females have conspicuous wing pads (actually short wings like that of the female oriental roach), which are functionless. Wings of the male are longer than its body, while wing pads of the female cover only one-third to two-thirds of the abdomen. The males fly swiftly but do not have the ability to sustain themselves in the air for long periods.
Related Websites:
Terms of service | About
|
__label__1
| 0.782251
|
How are electrons arranged around the nucleus?
Electrons, which are negatively charged, are arranged with even distribution outside the nucleus surrounding it. Go AnswerParty!
More Info:
electrons Physics Chemistry
Atomic physics
Atomic physics is the field of physics that studies atoms as an isolated system of electrons and an atomic nucleus. It is primarily concerned with the arrangement of electrons around the nucleus and the processes by which these arrangements change. This includes ions as well as neutral atoms and, unless otherwise stated, for the purposes of this discussion it should be assumed that the term atom includes ions.
The term atomic physics is often associated with nuclear power and nuclear bombs, due to the synonymous use of atomic and nuclear in standard English. However, physicists distinguish between atomic physics — which deals with the atom as a system consisting of a nucleus and electrons — and nuclear physics, which considers atomic nuclei alone.
Charge carriers
Introductory physics
Quantum chemistry
Quantum chemistry is a branch of chemistry whose primary focus is the application of quantum mechanics in physical models and experiments of chemical systems. It involves heavy interplay of experimental and theoretical methods:
In these ways, quantum chemists investigate chemical phenomena.
Electron Ion
Electric charge
Electric charge is the physical property of matter that causes it to experience a force when close to other electrically charged matter. There are two types of electric charges – positive and negative. Positively charged substances are repelled from other positively charged substances, but attracted to negatively charged substances; negatively charged substances are repelled from negative and attracted to positive. An object will be negatively charged if it has an excess of electrons, and will otherwise be positively charged or uncharged. The SI derived unit of electric charge is the coulomb (C), although in electrical engineering it is also common to use the ampere-hour (Ah), and in chemistry it is common to use the elementary charge (e) as a unit. The symbol Q is often used to denote a charge. The study of how charged substances interact is classical electrodynamics, which is accurate insofar as quantum effects can be ignored.
Atomic orbital
An atomic orbital is a mathematical function that describes the wave-like behavior of either one electron or a pair of electrons in an atom. This function can be used to calculate the probability of finding any electron of an atom in any specific region around the atom's nucleus. The term may also refer to the physical region or space where the electron can be calculated to be present, as defined by the particular mathematical form of the orbital.
Each orbital in an atom is characterized by a unique set of values of the three quantum numbers n, , and m, which correspond to the electron's energy, angular momentum, and an angular momentum vector component, respectively. Any orbital can be occupied by a maximum of two electrons, each with its own spin quantum number. The simple names s orbital, p orbital, d orbital and f orbital refer to orbitals with angular momentum quantum number = 0, 1, 2 and 3 respectively. These names, together with the value of n, are used to describe the electron configurations. They are derived from the description by early spectroscopists of certain series of alkali metal spectroscopic lines as sharp, principal, diffuse, and fundamental. Orbitals for > 3 are named in alphabetical order (omitting j).
Effective atomic number has two different meanings: one that is the effective nuclear charge of an atom, and one that calculates the average atomic number for a compound or mixture of materials. Both are abbreviated Zeff.
The effective atomic number Zeff, (sometimes referred to as the effective nuclear charge) of an atom is the number of protons an electron in the element effectively 'sees' due to screening by inner-shell electrons. It is a measure of the electrostatic interaction between the negatively charged electrons and positively charged protons in the atom. One can view the electrons in an atom as being 'stacked' by energy outside the nucleus; the lowest energy electrons (such as the 1s and 2s electrons) occupy the space closest to the nucleus, and electrons of higher energy are located further from the nucleus.
Technology Internet
Law Crime
Related Websites:
Terms of service | About
|
__label__1
| 0.997479
|
Identify and treat Pancreatitis
Techniques to treat pancreatitis naturally or by traditional methods If you have Pancreatitis, you need to seek treatment as soon as possible. Pancreatitis is often a starting point of Pancreatic Cancer. Dealing with pancreatitis will help you to stop the pain that likely got your attention in the first place, reverse the issues causing it and keep future complications to a minimum. Unfortunately, pancreatitis can return and it is important to both handle it quickly and get information regarding a long-term blueprint for keeping repeat attacks to a minimum.
Immediate Treatment You will receive treatment in a hospital to allow your pancreas to heal and make sure your body does not shut down. You will get intravenous (IV) fluids to replace lost fluids and maintain your blood pressure. Medicines to deal with pain can help you until the inflammation stops. Most acute pancreatitis can usually be treated relatively easily (from a medical standpoint). However, in some cases if you are suffering from severe pancreatitis, you may require intense medical support for your heart, potential ventilation for your lungs if they fail and occsionally dialysis to support the kidneys. Almost all patients require intravenous nutrition and to be taken off solid foods during treatment. You may get an infection in the places where regions of your pancreas have died. This type of infection can be fatal if left unchecked and needs skilled treatment to manage the infection and even potentially remove the infected dead pancreas material or drain certain areas with different procedures. A nutritionist will begin to interact with you as you will likely not be given anything to eat for up to a week to help "rest" your pancreas. They will regulate your IV nutrition and speak to you about eating the right foods.
Surgery Surgery is done only if your pain and pancreatitis tests demonstrate have not reacted to other treatment. There are several procedures which can be done; two of these procedures have already been used for many years, but one remains experimental. Relieve blockage - Surgery called pancreaticojejunostomy removes the blockages and resulting pressure in the pancreatic ducts. It alleviates pain in about 80 percent of people. For unknown reasons, pain returns within twelve months in some people who undergo this technique. Remove a part of the pancreas - Removing very specific damaged parts of the pancreas can relieve pain in some individuals with chronic pancreatitis. Remove the pancreas and transplant islet cells - An experimental method to fix the pancreatitis recently conducted in Japan involved removing the pancreas and then replacing the insulin-producing elements (called islets).
Stop The Pain down the road A health care provider can help stop painful symptoms of chronic pancreatitis. Simple things can aid you if you are diagnosed early, but more intensive measures may be required if you have waited and done harm to your pancreas.
It is advisable to Stop Drinking - This is the MOST important treatment for people with pancreatitis that drinking caused.
You might want to move to low-fat meals - Eating more but smaller, low-fat meals and drinking plenty of fluids can reduce your pain of chronic pancreatitis. You can take Pain medication - Nonprescription pain medications like Ibuprofen (to decrease swelling) usually decrease pain. Take Pancreatic enzyme supplements - Pancreatic enzyme replaces the enzymes normally excreted by the pancreas, letting the pancreas "rest." This often reduces swelling and in turn, pain. You may want to try Narcotic pain medicines - These medicines are often recommended if pancreatic enzymes don't stop pain and are typically used in the hospital during an acute pancreatitis attack. Treatments that fix the pancreatic ducts - Pancreatitis creates pain if there is blockage of the pancreatic ducts that restrict secretions from the pancreas. The back-up of pancreatic fluid in creates inflammation and pain of the pancreas. Sometimes the doctor needs to place a tube into the narrowed area (called stenting). This is not a typical option however as it carries its own set of risks.
Ways to get More Information
Pancreatitis From Medication Resource Line - This resource line can help in understanding your treatment options if your Pancreatitis could have been caused by medication. You can find treatment in your area and discuss compensation for treatment and loss of income, etc. Call: 888-240-1521 or go t their website at ways to treat Pancreatitis . Also visit the National Pancreas Foundation - This organization supports research of diseases of the pancreas and the website includes low-fat recipes. Call: 866-726-2737 or visit .
Herramientas personales
|
__label__1
| 0.92654
|
By Tim Lambert
The Tudors used linen to make shirts and underwear. However only the rich could afford cotton and silk clothes. Rich Tudors also embroidered their clothes with silk, gold or silver thread. Rich Tudor women wore silk stockings.
In the 16th century men wore short trouser-like garments called breeches. They also wore tight fitting jackets called doublets. Another jacket called a jerkin was worn over the doublet. Over the jerkin rich men wore a gown, or later in the 16th century a cloak or cape.
However instead of a doublet many workingmen wore a loose tunic. It was easier to work in. Some workingmen wore a leather jerkin called a buff-jerkin. Men also wore stockings or woolen socks, which were called hose.
Under their dresses Tudor women wore a garment like a nightie called a shift or chemise. It was made of linen or wool. A linen or wool dress went over it. A woman's dress was made of two parts, a bodice or corset like garment and a skirt. Sleeves were held on with laces and could be detached. Workingwomen wore a linen apron.
In the 16th century women did not wear knickers. However Tudor men sometimes wore linen shorts as underwear.
All Tudors wore hats. Poor women often wore a linen cap called a coif. After 1572 by law all men except nobles had to wear a woolen cap on Sundays.
In the 16th century buttons were usually for decoration. Clothes were often held together with laces or pins. Furs in Tudor times included cat, rabbit, beaver, bear, badger and polecat.
The most expensive dyes were bright red, purple and indigo. Poor people often wore brown, yellow or blue. Incidentally in the 16th century scarlet was not a colour it was the name of a fine, expensive wool.
Women who could afford it would hang a container of sweet smelling spices on their belt. This was called a pomander and it disguised the horrid smells in the streets! However it is a myth that in Tudor times people were very dirty and smelly. Most people tired to keep themselves clean (see Historical Myths) but it was difficult to keep free of vermin. On the wreck of the Mary Rose many lice combs were found. A bone ear scoop and a bone manicure set were also found.
A History of Clothes
A History of Women's Clothes
Tudor Food
Tudor Homes
Tudor Women
Tudor Children
Tudor Medicine
|
__label__1
| 0.8515
|
But the separation is not to last. When Mika returns a few months later, filled to bursting with the good news that she is pregnant, she is confident that the impending arrival of his child will shame the father-to-be into accepting a more "normal" line of work. Kobayashi, who has harbored a deep-seated resentment against his own dead-beat father for many years, struggles to cope with his conflicting emotions as his personal life becomes even more closely intertwined with his professional activities.
In a resolution that is wonderfully apt (if perhaps a trifle too tidy for complete plausibility), the young couple becomes drawn more-closely together by the very ceremonies that previously pushed them apart. After a lifetime of anger and denial, the young comforter finds himself in need of comforting, and what has been nothing more than a ritualistic exercise in the past becomes deeply personal. In the striking final scene, life and death are brought together into a wonderful simultaneity, as both husband and wife are transformed through their grief and resignation.
The story is spiritual rather than religious. Kobayashi participates in ceremonies for nearly every denomination, suggesting that his role as nokanshi is primarily a cultural one. But the film is also unashamed and uncompromising in its clear belief that death is far from the end of all things. As one character puts it, "Death is like a gateway. Dying doesn't mean the end. You go through it, and on to the next thing." For a society increasingly obsessed with extending life no matter the cost, the characters' matter-of-fact, fearless acceptance of their wholly natural worldly demise is both refreshing and inspiring.
|
__label__1
| 0.826966
|
7 SECRET HOME REMEDIES FOR WHEN YOUR CHILD IS SICK OR IN PAIN. 1. The B.R.A.T. for diarrhea. It stands for- Bananas, Rice, Applesauce, Toast 2. BLACK LICORICE will cure their constipation nine times out of ten! 3. The chemical reaction between baking soda and vinegar creates a cooling effect that will soothe your child’s minor burns. Just pour equal amounts of the ingredients into a bowl to bathe your child’s hand till the burning stops. 4. For an earache, use a hot pack ...
Simple Homemade Remedies For A Variety of Respiratory Illnesses
|
__label__1
| 0.957526
|
Australia passed 54 anti-terror laws post 9/11
Australia passed 54 anti-terror laws post 9/11 Sydney: Australia passed 54 new anti-terror laws in the decade after the 9/11 terror attack, according to a study. The new laws formed in response to the attack even surpassed measures taken in the US, Sydney Morning Herald reports.
Most of the laws were passed under the prime ministership of John Howard, on an average a new anti-terror statute was passed nearly every seven weeks until he was defeated.
Labor in opposition supported most of the statutes, commonly running to hundreds of pages.
In the Rudd-Gillard era, from November 2007 to September 11, 2011, only six anti-terror laws were enacted. University of New South Wales' Professor George Williams, who conducted the first count undertaken of national anti-terror laws, said that the scope exceeded measures in countries facing more severe threats.
He also cited power given to the Australian Security Intelligence Organisation to be able to detain and question ''non-suspect citizens' for up to a week as unique among comparable legal systems.
Australia has also copied many anti-terror measures from Britain without replicating equivalent safeguards such as a national human rights law. The legacy was an ''extraordinary bout of lawmaking'' in the post-9/11 decade, with many measures challenging long understood assumptions of criminal and other law, he said. Key aspects of anti-terror laws had been ''almost exclusively'' applied to members of the Muslim community and their organisations, Professor Williams said.
|
__label__1
| 0.553045
|
There are certain situations that the debugger cannot handle, because of the way the Python programming language works. If you are having problems getting the debugger to stop at breakpoints or to display source as you step through your code, one or more of these may apply.
Always read the Trouble-shooting Failure to Debug section first. If that fails to uncover your problem, refer to the following detailed documention of debugger limitations (many of which are extremely rare and esoteric):
(2) Running without saving will lead to incorrect display of breakpoints and run position because the debug process runs against the on-disk version of the source file. Wing will indicate in the Messages tool and Stack Data status indicator that some files are out of sync so this case should only occur if you ignore its warnings.
(3) You cannot run the debug program using the -O or -OO optimization options for the Python interpreter. This removes information about line numbers and source file names, making it impossible to stop at breakpoints or step through code.
(4) There are several cases where Wing may fail to stop at breakpoints or exceptions, or may fail to find source files corresponding with breakpoints or exception points. All of these are caused by storage of incorrect file names in *.pyc files:
• A similar problem may result from use of compileall.py and some other utilities that don't record a correct filename in the *.pyc file.
• If you run the same code twice using different paths to the same working directory, as is possible on Linux/Unix with symbolic links, the file names left in *.pyc may contain a mix of each of these paths. If the symbolic link that was used is subsequently removed, some of the file names become invalid.
(5) For code that spends much of its time in C/C++ without calling Python at all, for example as in a GUI main loop, the debugger may not reliably stop at breakpoints added during a run session, and may not respond to Pause requests. See section Debugging Non-Python Mainloops for more information.
(6) You cannot use pdb or other debuggers in code that you are running within the Wing debugger. The two debuggers conflict because they attempt to use the same debugger hooks in the Python interpreter.
(7) If you override __import__ in your code, you will break the debugger's ability to stop at breakpoints unless you call the original __import__ as part of your code whenever a module is actually imported. If you cannot call the original __import__ for some reason, it may be possible to instead use wingdbstub and then call wingdbstub.debugger.NotifyImport(mod) from your import handler (where mod is the module that was just imported).
(9) If you use an extension module to call C/C++ level stdio calls instead of using the Python-level facilities, the debug process will remain unresponsive to Wing IDE while waiting for keyboard input, I/O redirection to the Debug Probe in Wing Pro will fail, and you may run into out-of-order character reads in some cases. Details can be found in Debug Process I/O.
(10) Using partial path names in module __file__ attribute can in rare cases cause Wing to fail to stop on breakpoints and exceptions, to fail to display source files, or to confuse source files of the same name.
A partial path name may end up in __file__ only when (a) invoking Python code with a partial path name, for example with python myfile.py instead of python /path/to/myfile.py, (b) sending partial path names into exec, (c) using partial path names in your PYTHONPATH or sys.path, or (d) using compileall.py or similar tool to compile modules with a partial path name.
• When modules are loaded with partial path names and os.chdir() is called before debugging is started. This is only possible when using wingdbstub or otherwise starting debug after your debug process is started.
• When code objects are created on the fly using compile(), the C API, or the new module, a relative filename or an incorrect filename are used for the filename argument, and os.chdir() is called before the code is executed.
(12) In very rare cases, when using the wingdbstub.py, if you set sys.exitfunc after debugging has been started, the IDE will time out on a broken network connection after the debug program exits on an exception. This only happens in some exception handling modes with exceptions that look like they will be handled because a try/except block is present that might handle the exception, but where the exception is not in the end handled and the debug program exits without calling StopDebug(). Work-arounds include setting sys.exitfunc before importing wingdbstub.py or adding a top-level try/except clause that always calls StopDebug() before exiting the debug program.
« 13.9. Debugging Code Running Under Py2exeTable of Contents14. Integrated Version Control »
Debugger Limitations
|
__label__1
| 0.900742
|
Vent-A-Hood® Range Hoods - Articles
Glossary of Ventilation Terms
To make the field of kitchen ventilation systems easier to understand we have compiled a list of common terms that you might hear while dealing with professionals from the ventilation industry or while installing a range hood in your house. Just knowing the language can simplify the entire procedure.
BTU - British Thermal Unit. BTU’s are used to measure the heat output of gas cooking appliances.
Canopy - The physical exterior portion of the hood. Also may be referred to as a “shell”. The purpose of a range hood canopy is to collect cooking vapors as they rise up from the cooking surface.
CFM - Cubic Feet of Air per Minute. A measurement of the volume of air that is flowing into or out of a space.
Duct or Ducting - Duct is attached to the top of a range hood and serves to exhaust cooking contaminants to the outside air. The duct should be attached to an appropriate wall louver or roof jack.
External Blower - A blower unit that is mounted outside of the home on the wall or roof. The range hood canopy will contain mesh or baffle filters to extract grease.
Grease - A sticky film, that can become rancid, turn into fungus, and attract insects. Over one gallon of grease per year is generated in the average American home.
Heat - Created when a range burner is turned on. The heat from a standard four burner cooktop cancels out the efforts of one ton air conditioning if it is not removed from the home.
Hazardous Gases - Gases that are generated as a by-product of ignited natural gas. Nitrogen Dioxide and Carbon Monoxide are of the most concern if not removed from the home.
Holding Capacity - The interior space of a canopy. Generally speaking, the more powerful the cooking equipment beneath it, the larger the holding capacity that is required.
Liner or Liner Insert - A specialized range hood that is designed specifically to fit inside of a wood hood or other enclosure.
Mounting Height - The height off the cooking surface. The range hood should be hung at the recommended mounting height to allow for appropriate capture of cooking vapors.
Odor - The smell that is created during cooking. Odors are clingy, acidic, and will fade and deteriorate fabrics if not removed from the home.
Overlap - Sizing the range hood to be wider than the cooking equipment. Whenever possible, the range hood should overlap the cooking surface by 3” on each end. For island hoods, this recommendation should be considered mandatory.
Remote Blower - See external blower.
Roof Jack - An external venting piece on a roof of the home that connects to the duct on the range hood.
Smoke - Airborne carbon particles mixed with sulfuric acid. Smoke is an irritant to the eyes and poisonous to houseplants if not removed from the home.
Steam - Vaporized water. Steam can act as a “carrier” for other cooking contaminants if not removed from the home.
Wall Louver - An external venting piece on a side wall of the home that connects to the duct on the range hood.
Watts - A measurement of the heat output of electric cooking appliances.
|
__label__1
| 0.853929
|
Lincoln's Assassination Teacher Resources
Find Lincoln's Assassination educational ideas and activities
Showing 41 - 60 of 237 resources
In this word search worksheet, learners find the answers to 20 questions about President Lincoln in the puzzle. Students must have prior knowledge to complete, but answers are given "upside down" on worksheet.
Students examine the impact of the assassination of President Lincoln. After researching the Republican positions on Reconstruction and analyzing documents related to the Reconstruction, students take a position and explain their support of Lincoln or the Radical Republicans. In groups, they debate the question, "Would Reconstruction have been different had Lincoln lived?"
Pupils, in groups, use the Internet to research Abraham Lincoln. They role-play the part of a newspaper journalist and write an article about him.
Young scholars analyze the Civil War and the effects it had upon one person in particular, Abraham Lincoln, by analyzing images of the president at various stages in time. Students will also analyze an original drawing of Lincoln's arrival in Richmond, VA at the end of the war.
Young scholars examine the motivating factors that prompted Lincoln to draft the Emancipation Proclamation in 1863. They examine Lincoln's social and political beliefs, particularly as they pertained to slavery and race in the United States.
True to its titles, this engaging and appealing presentation brings the 1860's into close focus with a number of images and statistics that would delight any Civil War buff. A few graphs allow for pupil input, such as listing the advantages and disadvantages of the American North and South in 1861. The slides take viewers through the strategies and main events of the war, culminating in the assassination of Abraham Lincoln.
In this Abraham Lincoln crossword learning exercise, students read 20 clues pertaining to this famous President. Students fit their answers in a crossword puzzle.
Discuss the differences between the North and the South and how those differences led to the Civil War. Middle schoolers examine and analyze a famous speech or writing by President Lincoln in order to better understand the speaker's argument and discuss the conflicting opinions of the President during the war. After analyzing the speech or writing, learners write an essay in which they briefly summarize the speech.
Learners investigate the details of the October 27, 1999 assassinations in Armenia's Parliament - by developing a series of questions related to the causes of the attack, the effects on national and international scales.
Students examine the history of the penny. In this Lincoln Bicentennial One Cent teachers guide, students connect the life of President Abraham Lincoln to the 1-cent coin in his honor through a variety of lessons and activities.
Bring out the inner artist with this Abraham Lincoln lesson. Elementary students work on a home project creating a hat similar to Abraham Lincoln's hat. They will use geometry and measurement to create the scale of the hat, then construct it. This fascinating lesson covers many areas of the curriculum; art, history, mathematics and language arts. Great for all ages.
Students conduct research to compare the lives of George Washington and Abraham Lincoln. Students work in teams to collect data and use a graphic organizer to display the results of their research then share their research. Students complete project by creating an acrostic poem for the President they researched.
The Civil War is such an exciting topic, now it can be exciting to review. Play this millionaire-style game to study or review the American Civil War. Lincolns assassination, the Emancipation Proclamation, and the battles between the North and South are all covered.
Ninth graders explore the presidency of George Washington and Thomas Jefferson. In this US History lesson, 9th graders examine the life of Abraham Lincoln. students write an essay describing the presidency and the people's relationship to it.
Eighth graders explore the Civil War, and people and events surrounding the assassination of Abraham Lincoln and his funeral procession.
Students examine primary sources as related to Nevada and the Civil War. In this United States history lesson, students gather and analyze various primary sources in small groups and interpret unknown vocabulary words by using context clues.
Students examine Lincoln's life. In this U.S. history lesson plan, students examine facts about Abraham Lincoln and then complete 6 extension activities that require them to complete research regarding the Civil War.
Learners investigate George Washington, Abraham Lincoln, and other American Presidents. They complete a Webquest, take a virtual tour of Mount Vernon, answer discussion questions, and evaluate newspaper articles about the current president.
Students read background information about Abraham Lincoln. They research to examine the major battles of the Civil War. Locate and label them on a map of the United States. Indicate which side was victorious in each.
Take your traditional timeline project on the Civil War to the next level! From the attack on Fort Sumter in 1861 to the assassination of President Lincoln in 1865, your class members will research a particular event and then teach their classmates about the significance of their event.
Browse by Subject
Lincoln's Assassination
|
__label__1
| 0.630293
|
Type to find tags:
× 2682
a multi-paradigm, managed, garbage-collected, object-oriented programming language created by Microsoft in conjunction with the .NET platform.
× 2550
Java (not to be confused with JavaScript) is a class-based, object-oriented, strongly typed, reflective language and run-time environment (JRE). Java programs are compiled to byte-code and run in a vi…
× 2154
ECMAScript (commonly referred to as JavaScript) is primarily used for scripting web-pages but also has several embedded forms and stand-alone interpreters / JIT engines. Use this tag for questions reg…
× 1890
an interpreted, general-purpose high-level programming language whose design philosophy emphasizes code readability.
× 1652
a widely-used, general-purpose scripting language that is especially suited for web development.
× 1502
× 1311
the act of improving a method or design. In programming, optimization usually takes the form of improving the efficiency of an algorithm, or reducing the resources it requires (space i…
× 1106
× 884
a subset of Optimization: performance is the goal when you want the execution time of your program or routine to be optimal.
× 800
a precise plan (in the format of a sequence of steps) on how to solve a particular problem.
× 798
to your question to indicate that you are new to the language of your code. This will often be taken in to consideration by reviewers when assessing your code.
× 727
a general-purpose computer programming language used for operating systems, games and other high performance work and is clearly distinct from C++. It was developed in 1972 by Dennis Ritchie for …
× 577
a programming paradigm using "objects": data structures consisting of data fields and methods together with their interactions.
× 538
a multi-platform open-source dynamic object-oriented interpreted language created by Yukihiro Matsumoto (Matz) in 1993.
× 515
× 513
a sequence of zero or more characters. It is commonly used to represent text or a sequence of bytes. Use this tag along with the appropriate programming language being used.
× 462
the standard content markup language of the web. It is an open standard developed and maintained by W3C (World Wide Web Consortium).
× 417
For questions requesting reviews of game-themed code.
× 411
a software framework supporting a multi-language paradigm and supporting language interoperability. .NET applications are executed in a virtual machine (CLR) which provides a few important ser…
× 399
how work performed by a computer can be divided into multiple concurrent streams of execution (generally referred to as threads).
× 392
a language for interacting with relational databases. Read the tag wiki's guidelines for requesting SQL reviews: 1) Provide context, 2) Include the schema, 3) If asking ab…
× 369
an open-source, relational database management system.
× 366
an ordered data structure consisting of a collection of elements (values or variables), each identified by one (single dimensional array, or vector) or multiple indexes.
× 355
the successor to the C++03 standard, adding various core language changes and fixes, and an improved and expanded standard library.
× 273
Parsing refers to the action by software of breaking an artifact into its constituent elements and capturing the relationship between those elements.
× 269
a way of organizing data in a fashion that allows particular properties of that data to be queried and/or updated efficiently.
× 264
a type of control flow structure in programming in which a series of statements may be executed repeatedly until some condition is met.
× 263
a purely functional programming language, featuring static typing, lazy evaluation, and monadic effects. The primary implementation is GHC, a high-performance compiler with a runtime suppor…
× 263
a language used to control the presentation of HTML and XML documents including colors, layout and fonts.
× 250
used for topics relating to application security and attacks against software.
× 248
an open-source web development framework optimized for programmer happiness and maintaining sustainable productivity. Many things are defined by convention, freeing you from having to…
× 246
Core to Object-Oriented Programming (OOP), a class is a template for creating new objects that describes the common state(s) and behavior(s).
× 242
× 238
a method of problem solving where the solution to a problem depends on solutions to smaller instances of the same problem.
× 230
Google's software stack for mobile devices. For non-developer questions, see http://android.stackexchange.com
× 228
a web application framework developed by Microsoft to allow programmers to build dynamic web sites and web applications.
|
__label__1
| 0.992958
|
Stock watch:
Potential Pitfalls As Economy Gains Momentum
hulu videos 2:19 mins
After the worst economic downturn since the Great Depression, the economy may be ready to take off again, but rising mortgage rates and tight lending could threaten housing, and unforeseen political or economic events could topple stock prices.
|
__label__1
| 0.930783
|
1. Education
What Is Sociology?
An Introduction To Sociology
What Is Sociology?
Sociology, in the broadest sense, is the study of society. Sociology is a very broad discipline that examines how humans interact with each other and how human behavior is shaped by social structures (groups, communities, organizations), social categories (age, sex, class, race, etc.), and social institutions (politics, religion, education, etc.). The basic foundation of sociology is the belief that a person's attitudes, actions, and opportunities are shaped by all of these aspects of society. The sociological perspective is fourfold: Individuals belong to groups; groups influence our behavior; groups take on characteristics that are independent of their members (i.e. the whole is greater than the sum of its parts); and sociologists focus on behavior patterns of groups, such as differences based on sex, race, age, class, etc.
Sociology originated from and was influenced by the industrial revolution during the early nineteenth century. There are five major founders of sociology: August Comte, Herbert Spencer, Karl Marx, Emile Durkheim, and Max Weber. August Comte is thought of as the "Father of Sociology" as he coined the term sociology in 1838. He believed that society should be understood and studied as it was, rather than what it ought to be. He was the first to recognize that the path to understanding the world and society was based in science. Marx, Spencer, Durkheim, and Weber further helped define and develop sociology as a science and discipline, each contributing important theories and concepts still used and understood in the field today.
Current Approaches
Today there are two main approaches to studying sociology. The first is macro-sociology, or the study of society as a whole. This approach emphasizes the analysis of social systems and populations on a large scale and at a high level of theoretical abstraction. Macro-sociology does concern individuals, families, and other aspects of society, but it always does so in relation to the larger social system to which they belong. The second approach is micro-sociology, or the study of small group behavior. This approach focuses on the nature of everyday human social interactions on a small scale. At the micro level, social status and social roles are the most important components of social structure and micro-sociology is based on the ongoing interactions between these social roles.
Areas Of Sociology
Sociology is a very broad and diverse field. There are many different topics and scopes in the field of sociology, some of which are relatively new. The following are some of the major areas of research and application within the field of sociology. For a full list of sociology disciplines and areas of research, visit the sociology disciplines page.
Family. The sociology of family examines things such as marriage, divorce, child rearing, and domestic abuse. Specifically, sociologists study how these aspects of the family are defined in different cultures and times and how they affect individuals and institutions.
Deviance And Crime. These sociologists, also called criminologists, examine cultural norms, how they change over time, how they are enforced, and what happens to individuals and societies when norms are broken. Deviance and social norms vary among societies, communities, and times, and often sociologists are interested in why these differences exist and how these differences impact the individuals and groups in those areas.
Demography. Demography refers to a population's composition. Some of the basic concepts explored in demography include birth rate, fertility rate, death rate, infant mortality rate, and migration. Demographers are interested in how and why these demographics vary between societies, groups, and communities.
Social Inequality. The study of social inequality examines the unequal distribution of power, privilege, and prestige in society. These sociologists study differences and inequalities in social class, race, and gender.
Health And Illness. Sociologists who study health and illness focus on the social effects of, and societal attitudes towards, illnesses, diseases, disabilities, and the aging process. This is not to be confused with medical sociology, which focuses on medical institutions such as hospitals, clinics, and physician offices as well as the interactions among physicians.
Work And Industry. The sociology of work concerns the implications of technological change, globalization, labor markets, work organization, managerial practices, and employment relations. These sociologists are interested in workforce trends and how they relate to the changing patterns of inequality in modern societies as well as how they affect the experiences of individuals and families.
Race And Ethnicity. The sociology of race and ethnicity examines the social, political, and economic relations between races and ethnicities at all levels of society. Topics commonly studied include racism, residential segregation, and the differences in social processes between racial and ethnic groups.
Military. Military sociology looks at the military as a social group rather than an organization and examines issues related to coerced collective action, survival in vocation and combat, civilian-military relations, and interactions between other groups or government agencies.
Education. The sociology of education is the study of how educational institutions determine social structures and experiences. In particular, sociologists might look at how different aspects of educational institutions (teacher attitudes, peer influence, school climate, school resources, etc.) affect learning and other outcomes.
Religion. The sociology of religion concerns the practice, history, development, and roles of religion in society. These sociologists examine religious trends over time, how various religions affect social interactions both within the religion and outside of it, and relations within religious institutions.
The Internet. Sociology of the Internet includes the analysis of online communities (newsgroups, social networking sites, etc.) and virtual worlds. Sociologists are interested in the social implications of the Internet and how virtual communities and worlds are transforming real communities and societies across the globe.
©2014 About.com. All rights reserved.
|
__label__1
| 0.998627
|
That a society controls, to a greater or lesser extent, the behavior of its members is a universal; but the methods, the particulars of that control, vary from one culture to another.
Kenneth L. Pike
|
__label__1
| 0.925931
|
Create a Trust, in Case of Tragedy
Most parents know how important it is to choose a guardian to take care of their children in case something terrible happens. But what about your children's financial needs? There needs to be a plan in place for those, too. That's why parents should consider creating a trust. Here's what you need to consider.
|
__label__1
| 0.957325
|
U.S. Edition
Search Ticker
ETFs Unsociable To Social Media
ETFs Unsociable To Social Media
The Nasdaq OMX Group recently shortened the seasoning period for possible entrants into the Nasdaq 100 Index, which may provide the social media industry with an opportunity to integrate into major ETFs, according to an article on Barron’s.
The period was shortened to three months, most likely to allow social media giant Facebook to be eligible to join the Nasdaq-100 by the end of this year. The change could allow promising companies like Groupon and LinkedIn into the fray as well, the article said.
Currently, social-media-focused ETFs have yet to attract much attention, and there aren’t enough U.S. social media stocks to build a U.S.-focused ETF, according to the article.
Head over to Barrons.com to read more.
IndexUniverse is excited
to announce our new name:
|
__label__1
| 0.74332
|
Closing In On Quantum Chemistry
September 9, 2005
BERKELEY, CA – Researchers in the Department of Energy’s Lawrence Berkeley National Laboratory and the University of California at Berkeley have simulated the process by which a quantum computer could calculate to high precision an important basic property of two small molecules. Simulated quantum calculations of the ground-state energies of water (H 2O) and lithium hydride (LiH) are the first of this kind ever done for specific molecules.
Alán Aspuru-Guzik, Anthony Dutoi, Peter Love, and Martin Head-Gordon report on their work in the 9 September issue of the journal Science. Head-Gordon is a staff scientist in Berkeley Lab’s Chemical Sciences Division and a professor of chemistry at UC Berkeley; Aspuru-Guzik is a postdoctoral fellow and Dutoi a graduate student in the Head-Gordon group. Love is a senior applications scientist on the staff of D-Wave Systems, Inc. in Vancouver, B.C.
The researchers developed a quantum-computational algorithm and ran it on a classical computer to demonstrate that quantum computers comprised of only tens or a few hundreds of quantum bits (qubits) could calculate significant information about real molecular systems to high accuracy. Thus a relatively small quantum computer could surpass the most powerful quantum-chemistry calculations possible with today’s classical supercomputers.
“What we have done is demonstrate “” by using a quantum algorithm to determine the states of minimum energy for two real molecules “” that quantum computing can deliver on the promise of giving highly accurate practical solutions to interesting chemical problems,” says Aspuru-Guzik.
Confronting virtually unsolvable problems
The Head-Gordon group concentrates on calculating the electronic structure of molecules from first principles “” that is, from a quantum-mechanical description of the states of all the particles in the system. Electronic structure calculations allow scientists to predict how molecules react with other molecules and are key to understanding and controlling their physical and chemical properties.
The practical challenge of such calculations was famously expressed by Paul Dirac in 1929, who remarked of quantum mechanics that “The underlying physical laws necessary for the mathematical theory of a large part of physics and the whole of chemistry are thus completely known, and the difficulty is only that the exact application of these laws leads to equations much too complicated to be soluble.”
Indeed, exact solutions of the Schrödinger equation, the fundamental expression of quantum mechanics, are so complicated that classical computers are only able to exactly solve very small molecules, about the size of water, because the time needed for computation increases exponentially with size. Practical calculations on real molecules are performed using approximations such as density functional theories. These are useful and usually accurate, but nonetheless are still approximations, which can sometimes fail. As long ago as 1982 Richard Feynman suggested that an easier way to calculate a quantum system might be by using quantum computers.
Unlike classical computing, where each bit represents either a 0 or a 1 but not both at once, a quantum bit simultaneously superposes 0 and 1 and only resolves (or “collapses”) to a single value when measured. While a classical computer operates serially, essentially dealing with one bit after another, a quantum computer’s qubits interact to form very large computational spaces that, when measured, quickly deliver the solution to a complex problem.
Various physical systems have been used to perform quantum computations, but no one has yet built a quantum computer large enough to compete with classical computers. Hardware is only part of the challenge. Another is devising practical algorithms that can run on quantum computers; in principle these can be run “” if much more slowly “” on classical simulations of quantum computers, provided only a few qubits are involved.
Aspuru-Guzik calls this the Russian doll approach: “You begin with the physical system you want to describe “” that’s the biggest doll, with the most information. Inside that is the basic equation that describes the system. Inside that is an ‘emulation’ of the system using a quantum computer. And inside that is a simulation of the quantum computer on a classical computer.”
The limits to computation
Classical supercomputers are hardly tiny; rather they are limited by the number of operations they can manage within a reasonable time. Only very small molecular systems have been solved exactly from first principles, because the orbital states of each particle in the system must be represented in what’s known as a basis set, which in a molecule with many electrons is very large indeed. As the size of the system increases, the number of calculations “” and thus the time needed to solve the problem “” increases exponentially (the larger the number gets, the faster it grows).
Using quantum algorithms on a quantum computer, however, the number of calculations (and thus the time) grows only polynomially “” faster than linearly, but still “efficiently” “” as the size of the basis set grows.
Aspuru-Guzik says, “We chose to calculate water and lithium hydride because three-atom water is a good-sized molecule with a small basis set, while two-atom lithium hydride is a small molecule but has a comparatively large basis set.”
Two factors were key to the group’s success. One was finding an efficient way to achieve the essential starting point of any calculation, an approximation of the ground-state energy sufficiently close to the actual state “” the process of “preparing the state that you will simulate,” as Aspuru-Guzik puts it. The researchers showed that by using a method called adiabatic state preparation (ASP), even a relatively crude initial estimate was practical.
“‘Adiabatic’ in this context means reiterating approximations of the state slowly,” he says. “How fast you can prepare the state is determined by the gap between the ground state of the molecule and its lowest excited state. We found a way to keep this gap large.” The researchers confirmed the accuracy of the ASP method by calculating the ground state of the two-electron hydrogen molecule (H 2).
Even more important was their adaptation of a quantum algorithm called a phase estimation algorithm (PEA), proposed by Daniel Abrams and Seth Lloyd six years ago. The original version required a read-out register of about 20 qubits “” prohibitively large for early quantum computers. By modifying PEA so that it performed recursively, approaching greater accuracy with each repeated calculation, the researchers reduced the size of the read-out register to a manageable four qubits.
Don’t try this at home
Applying these and other measures, the researchers were able to simulate a quantum computer’s calculation of the ground states of water and lithium hydride with accuracy to six decimal places. A real quantum computer could have performed the same calculations almost instantly. Its classical simulacrum, however, was an order of magnitude less efficient than the best conventional methods now available, leading the authors to emphasize that “while possible as experiments, such simulations are not competitive as an alternative” to what people already do on classical computers.
“In other words, we’re saying don’t try this at home,” says Aspuru-Guzik. “What we’ve done is illustrate the truth of the conjecture that to exceed the limits of classical computing, quantum algorithms running with at least 40 to 100 qubits are needed.”
The members of Head-Gordon’s group at Berkeley Lab and UC Berkeley continue to explore new theoretical approaches and define more specifics for the design of practical algorithms to enable quantum chemistry on quantum computers. Making the vast power and speed of quantum computers available to industrial customers is the goal of Vancouver’s D-Wave Systems, Inc., the Head-Gordon group’s research partner and sponsor in the work.
“Simulated quantum computation of molecular energies,” by Alán Aspuru-Guzik, Anthony D. Dutoi, Peter J. Love, and Martin Head-Gordon, appears in the 9 September 2005 edition of Science.
On the World Wide Web:
DOE/Lawrence Berkeley National Laboratory
comments powered by Disqus
|
__label__1
| 0.926946
|
Brits: Give us £1m and we'll build a crack ALIEN-HUNTING TEAM
First we're snooping on the world, now we'll snoop on the galaxy
Build a business case: developing custom apps
A group of British scientists have launched a new mission to find signs of extraterrestrial life way out in the depths of space.
Boffins from 11 different universities and scientific bodies have joined forces to organise a search for little green men. The group - called the UK Search for Extraterrestrial Intelligence (SETI) Research Network - held its first formal session on Friday at the annual National Astronomy Meeting held in Scotland's University of St Andrews.
The brainstorming get-together was the first time British boffins had gathered to discuss the search for aliens since 2010. Now they need to work out how to fund the effort.
The US spends far more time and money looking for aliens than all other nations - but that's private money, not taxpayers' cash. Donors to the US SETI Institute have included William Hewlett, David Packard and Gordon Moore.
Meanwhile, UK SETI Research Network coordinator Alan Penny said the group will be asking for a piece of the British government's science budget. Sir Martin Rees, English Astronomer Royal, will serve as the group's patron and hopes to plead its case for the £1m in annual funding Penny reckons it needs.
"If we had one part in 200 - half a per cent of the money that goes into astronomy at the moment - we could make an amazing difference. We would become comparable with the American effort," he said.
Penny added: "I don't know whether [aliens] are out there, but I'm desperate to find out. It's quite possible that we're alone in the Universe. And think about the implications of that: if we're alone in the Universe then the whole purpose in the universe is in us. If we're not alone, that's interesting in a very different way."
At the alien finders' first meeting, they discussed ways to conduct the search. Eamonn Ansbro, an Irish astronomer, suggested looking closely at our local solar system to find alien probes. Another speaker, Anders Sandberg, later performed a game theory analysis of a "deadly probes scenario", in which sociopathic aliens send out robo-drones to destroy any fledgling civilisations they come across.
However, this may be unlikely if Austin Gerig's Universal Doomsday theory is true. The Oxford University research fellow discussed the thought that civilisations don't really last long enough to find extra-terrestrial life because they spend too much time killing each other. Cheery stuff indeed.
Radio silence
Much of past SETI research has relied upon listening out for radio signals from far-off civilisations, which would not only prove their existence, but give human pop fans some really far-out tunes to listen to.
Jodrell Bank's Lovell Telescope has been previously used in SETI projects seeking alien radio comms.
Although it is far from certain that cash-strapped British funding bodies will hand over cash to alien hunters, Jodrell Bank associate director Tim O'Brien said it could easily be done on the cheap by piggybacking current projects.
For example, Jodrell Bank has now joined up with a network of seven radio telescopes across Britain in the e-Merlin project to research important scientific phenomena such as the formation of stars and black holes. The telescopes are connected to Jodrell Bank by a superfast optical fibre network, effectively allowing them to work simultaneously. The network has just come online.
"You could do serendipitous searches," said O'Brien.
"So if the telescopes were studying quasars, for example, we could piggy-back off that and analyse the data to look for a different type of signal - not the natural astrophysical signal that the quasar astronomer was interested in, but something in the noise that one might imagine could be associated with aliens. This approach would get you SETI research almost for free.
The Essential Guide to IT Transformation
More from The Register
next story
Asteroid's DINO KILLING SPREE just bad luck – boffins
Sauricide WASN'T inevitable, reckon scientists
Flamewars in SPAAACE: cooler fires hint at energy efficiency
Experiment aboard ISS shows we should all chill out for cleaner engines
Boffins discuss AI space program at hush-hush IARPA confab
NASA Mars rover FINALLY equals 1973 Soviet benchmark
Yet to surpass ancient Greek one, however
Radio astronomy suffering to protect Square Kilometre Array
We have found the Holy Grail (of batteries) - boffins
prev story
Implementing global e-invoicing with guaranteed legal certainty
Consolidation: The Foundation for IT Business Transformation
Backing up Big Data
Boost IT visibility and business value
Why and how to choose the right cloud vendor
|
__label__1
| 0.576155
|
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.